{
	"document":{
		"aggregate_severity":{
			"namespace":"https://nvd.nist.gov/vuln-metrics/cvss",
			"text":"High"
		},
		"category":"csaf_vex",
		"csaf_version":"2.0",
		"distribution":{
			"tlp":{
				"label":"WHITE",
				"url":"https:/www.first.org/tlp/"
			}
		},
		"lang":"en",
		"notes":[
			{
				"text":"kernel security update",
				"category":"general",
				"title":"Synopsis"
			},
			{
				"text":"An update for kernel is now available for openEuler-20.03-LTS-SP4",
				"category":"general",
				"title":"Summary"
			},
			{
				"text":"The Linux Kernel, the operating system core itself.\n\nSecurity Fix(es):\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nf2fs: let's avoid panic if extent_tree is not created\n\nThis patch avoids the below panic.\n\npc : __lookup_extent_tree+0xd8/0x760\nlr : f2fs_do_write_data_page+0x104/0x87c\nsp : ffffffc010cbb3c0\nx29: ffffffc010cbb3e0 x28: 0000000000000000\nx27: ffffff8803e7f020 x26: ffffff8803e7ed40\nx25: ffffff8803e7f020 x24: ffffffc010cbb460\nx23: ffffffc010cbb480 x22: 0000000000000000\nx21: 0000000000000000 x20: ffffffff22e90900\nx19: 0000000000000000 x18: ffffffc010c5d080\nx17: 0000000000000000 x16: 0000000000000020\nx15: ffffffdb1acdbb88 x14: ffffff888759e2b0\nx13: 0000000000000000 x12: ffffff802da49000\nx11: 000000000a001200 x10: ffffff8803e7ed40\nx9 : ffffff8023195800 x8 : ffffff802da49078\nx7 : 0000000000000001 x6 : 0000000000000000\nx5 : 0000000000000006 x4 : ffffffc010cbba28\nx3 : 0000000000000000 x2 : ffffffc010cbb480\nx1 : 0000000000000000 x0 : ffffff8803e7ed40\nCall trace:\n __lookup_extent_tree+0xd8/0x760\n f2fs_do_write_data_page+0x104/0x87c\n f2fs_write_single_data_page+0x420/0xb60\n f2fs_write_cache_pages+0x418/0xb1c\n __f2fs_write_data_pages+0x428/0x58c\n f2fs_write_data_pages+0x30/0x40\n do_writepages+0x88/0x190\n __writeback_single_inode+0x48/0x448\n writeback_sb_inodes+0x468/0x9e8\n __writeback_inodes_wb+0xb8/0x2a4\n wb_writeback+0x33c/0x740\n wb_do_writeback+0x2b4/0x400\n wb_workfn+0xe4/0x34c\n process_one_work+0x24c/0x5bc\n worker_thread+0x3e8/0xa50\n kthread+0x150/0x1b4(CVE-2022-48877)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nregulator: da9211: Use irq handler when ready\n\nIf the system does not come from reset (like when it is kexec()), the\nregulator might have an IRQ waiting for us.\n\nIf we enable the IRQ handler before its structures are ready, we crash.\n\nThis patch fixes:\n\n[    1.141839] Unable to handle kernel read from unreadable memory at virtual address 0000000000000078\n[    1.316096] Call trace:\n[    1.316101]  blocking_notifier_call_chain+0x20/0xa8\n[    1.322757] cpu cpu0: dummy supplies not allowed for exclusive requests\n[    1.327823]  regulator_notifier_call_chain+0x1c/0x2c\n[    1.327825]  da9211_irq_handler+0x68/0xf8\n[    1.327829]  irq_thread+0x11c/0x234\n[    1.327833]  kthread+0x13c/0x154(CVE-2022-48891)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nnet: arcnet: com20020: Fix null-ptr-deref in com20020pci_probe()\n\nDuring driver initialization, the pointer of card info, i.e. the\nvariable 'ci' is required. However, the definition of\n'com20020pci_id_table' reveals that this field is empty for some\ndevices, which will cause null pointer dereference when initializing\nthese devices.\n\nThe following log reveals it:\n\n[    3.973806] KASAN: null-ptr-deref in range [0x0000000000000028-0x000000000000002f]\n[    3.973819] RIP: 0010:com20020pci_probe+0x18d/0x13e0 [com20020_pci]\n[    3.975181] Call Trace:\n[    3.976208]  local_pci_probe+0x13f/0x210\n[    3.977248]  pci_device_probe+0x34c/0x6d0\n[    3.977255]  ? pci_uevent+0x470/0x470\n[    3.978265]  really_probe+0x24c/0x8d0\n[    3.978273]  __driver_probe_device+0x1b3/0x280\n[    3.979288]  driver_probe_device+0x50/0x370\n\nFix this by checking whether the 'ci' is a null pointer first.(CVE-2022-48908)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nio_uring: add a schedule point in io_add_buffers()\n\nLooping ~65535 times doing kmalloc() calls can trigger soft lockups,\nespecially with DEBUG features (like KASAN).\n\n[  253.536212] watchdog: BUG: soft lockup - CPU#64 stuck for 26s! [b219417889:12575]\n[  253.544433] Modules linked in: vfat fat i2c_mux_pca954x i2c_mux spidev cdc_acm xhci_pci xhci_hcd sha3_generic gq(O)\n[  253.544451] CPU: 64 PID: 12575 Comm: b219417889 Tainted: G S         O      5.17.0-smp-DEV #801\n[  253.544457] RIP: 0010:kernel_text_address (./include/asm-generic/sections.h:192 ./include/linux/kallsyms.h:29 kernel/extable.c:67 kernel/extable.c:98)\n[  253.544464] Code: 0f 93 c0 48 c7 c1 e0 63 d7 a4 48 39 cb 0f 92 c1 20 c1 0f b6 c1 5b 5d c3 90 0f 1f 44 00 00 55 48 89 e5 41 57 41 56 53 48 89 fb <48> c7 c0 00 00 80 a0 41 be 01 00 00 00 48 39 c7 72 0c 48 c7 c0 40\n[  253.544468] RSP: 0018:ffff8882d8baf4c0 EFLAGS: 00000246\n[  253.544471] RAX: 1ffff1105b175e00 RBX: ffffffffa13ef09a RCX: 00000000a13ef001\n[  253.544474] RDX: ffffffffa13ef09a RSI: ffff8882d8baf558 RDI: ffffffffa13ef09a\n[  253.544476] RBP: ffff8882d8baf4d8 R08: ffff8882d8baf5e0 R09: 0000000000000004\n[  253.544479] R10: ffff8882d8baf5e8 R11: ffffffffa0d59a50 R12: ffff8882eab20380\n[  253.544481] R13: ffffffffa0d59a50 R14: dffffc0000000000 R15: 1ffff1105b175eb0\n[  253.544483] FS:  00000000016d3380(0000) GS:ffff88af48c00000(0000) knlGS:0000000000000000\n[  253.544486] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[  253.544488] CR2: 00000000004af0f0 CR3: 00000002eabfa004 CR4: 00000000003706e0\n[  253.544491] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n[  253.544492] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n[  253.544494] Call Trace:\n[  253.544496]  <TASK>\n[  253.544498] ? io_queue_sqe (fs/io_uring.c:7143)\n[  253.544505] __kernel_text_address (kernel/extable.c:78)\n[  253.544508] unwind_get_return_address (arch/x86/kernel/unwind_frame.c:19)\n[  253.544514] arch_stack_walk (arch/x86/kernel/stacktrace.c:27)\n[  253.544517] ? io_queue_sqe (fs/io_uring.c:7143)\n[  253.544521] stack_trace_save (kernel/stacktrace.c:123)\n[  253.544527] ____kasan_kmalloc (mm/kasan/common.c:39 mm/kasan/common.c:45 mm/kasan/common.c:436 mm/kasan/common.c:515)\n[  253.544531] ? ____kasan_kmalloc (mm/kasan/common.c:39 mm/kasan/common.c:45 mm/kasan/common.c:436 mm/kasan/common.c:515)\n[  253.544533] ? __kasan_kmalloc (mm/kasan/common.c:524)\n[  253.544535] ? kmem_cache_alloc_trace (./include/linux/kasan.h:270 mm/slab.c:3567)\n[  253.544541] ? io_issue_sqe (fs/io_uring.c:4556 fs/io_uring.c:4589 fs/io_uring.c:6828)\n[  253.544544] ? __io_queue_sqe (fs/io_uring.c:?)\n[  253.544551] __kasan_kmalloc (mm/kasan/common.c:524)\n[  253.544553] kmem_cache_alloc_trace (./include/linux/kasan.h:270 mm/slab.c:3567)\n[  253.544556] ? io_issue_sqe (fs/io_uring.c:4556 fs/io_uring.c:4589 fs/io_uring.c:6828)\n[  253.544560] io_issue_sqe (fs/io_uring.c:4556 fs/io_uring.c:4589 fs/io_uring.c:6828)\n[  253.544564] ? __kasan_slab_alloc (mm/kasan/common.c:45 mm/kasan/common.c:436 mm/kasan/common.c:469)\n[  253.544567] ? __kasan_slab_alloc (mm/kasan/common.c:39 mm/kasan/common.c:45 mm/kasan/common.c:436 mm/kasan/common.c:469)\n[  253.544569] ? kmem_cache_alloc_bulk (mm/slab.h:732 mm/slab.c:3546)\n[  253.544573] ? __io_alloc_req_refill (fs/io_uring.c:2078)\n[  253.544578] ? io_submit_sqes (fs/io_uring.c:7441)\n[  253.544581] ? __se_sys_io_uring_enter (fs/io_uring.c:10154 fs/io_uring.c:10096)\n[  253.544584] ? __x64_sys_io_uring_enter (fs/io_uring.c:10096)\n[  253.544587] ? do_syscall_64 (arch/x86/entry/common.c:50 arch/x86/entry/common.c:80)\n[  253.544590] ? entry_SYSCALL_64_after_hwframe (??:?)\n[  253.544596] __io_queue_sqe (fs/io_uring.c:?)\n[  253.544600] io_queue_sqe (fs/io_uring.c:7143)\n[  253.544603] io_submit_sqe (fs/io_uring.c:?)\n[  253.544608] io_submit_sqes (fs/io_uring.c:?)\n[  253.544612] __se_sys_io_uring_enter (fs/io_uring.c:10154 fs/io_uri\n---truncated---(CVE-2022-48937)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nAdd exception protection processing for vd in axi_chan_handle_err function\n\nSince there is no protection for vd, a kernel panic will be\ntriggered here in exceptional cases.\n\nYou can refer to the processing of axi_chan_block_xfer_complete function\n\nThe triggered kernel panic is as follows:\n\n[   67.848444] Unable to handle kernel NULL pointer dereference at virtual address 0000000000000060\n[   67.848447] Mem abort info:\n[   67.848449]   ESR = 0x96000004\n[   67.848451]   EC = 0x25: DABT (current EL), IL = 32 bits\n[   67.848454]   SET = 0, FnV = 0\n[   67.848456]   EA = 0, S1PTW = 0\n[   67.848458] Data abort info:\n[   67.848460]   ISV = 0, ISS = 0x00000004\n[   67.848462]   CM = 0, WnR = 0\n[   67.848465] user pgtable: 4k pages, 48-bit VAs, pgdp=00000800c4c0b000\n[   67.848468] [0000000000000060] pgd=0000000000000000, p4d=0000000000000000\n[   67.848472] Internal error: Oops: 96000004 [#1] SMP\n[   67.848475] Modules linked in: dmatest\n[   67.848479] CPU: 0 PID: 0 Comm: swapper/0 Not tainted 5.10.100-emu_x2rc+ #11\n[   67.848483] pstate: 62000085 (nZCv daIf -PAN -UAO +TCO BTYPE=--)\n[   67.848487] pc : axi_chan_handle_err+0xc4/0x230\n[   67.848491] lr : axi_chan_handle_err+0x30/0x230\n[   67.848493] sp : ffff0803fe55ae50\n[   67.848495] x29: ffff0803fe55ae50 x28: ffff800011212200\n[   67.848500] x27: ffff0800c42c0080 x26: ffff0800c097c080\n[   67.848504] x25: ffff800010d33880 x24: ffff80001139d850\n[   67.848508] x23: ffff0800c097c168 x22: 0000000000000000\n[   67.848512] x21: 0000000000000080 x20: 0000000000002000\n[   67.848517] x19: ffff0800c097c080 x18: 0000000000000000\n[   67.848521] x17: 0000000000000000 x16: 0000000000000000\n[   67.848525] x15: 0000000000000000 x14: 0000000000000000\n[   67.848529] x13: 0000000000000000 x12: 0000000000000040\n[   67.848533] x11: ffff0800c0400248 x10: ffff0800c040024a\n[   67.848538] x9 : ffff800010576cd4 x8 : ffff0800c0400270\n[   67.848542] x7 : 0000000000000000 x6 : ffff0800c04003e0\n[   67.848546] x5 : ffff0800c0400248 x4 : ffff0800c4294480\n[   67.848550] x3 : dead000000000100 x2 : dead000000000122\n[   67.848555] x1 : 0000000000000100 x0 : ffff0800c097c168\n[   67.848559] Call trace:\n[   67.848562]  axi_chan_handle_err+0xc4/0x230\n[   67.848566]  dw_axi_dma_interrupt+0xf4/0x590\n[   67.848569]  __handle_irq_event_percpu+0x60/0x220\n[   67.848573]  handle_irq_event+0x64/0x120\n[   67.848576]  handle_fasteoi_irq+0xc4/0x220\n[   67.848580]  __handle_domain_irq+0x80/0xe0\n[   67.848583]  gic_handle_irq+0xc0/0x138\n[   67.848585]  el1_irq+0xc8/0x180\n[   67.848588]  arch_cpu_idle+0x14/0x2c\n[   67.848591]  default_idle_call+0x40/0x16c\n[   67.848594]  do_idle+0x1f0/0x250\n[   67.848597]  cpu_startup_entry+0x2c/0x60\n[   67.848600]  rest_init+0xc0/0xcc\n[   67.848603]  arch_call_rest_init+0x14/0x1c\n[   67.848606]  start_kernel+0x4cc/0x500\n[   67.848610] Code: eb0002ff 9a9f12d6 f2fbd5a2 f2fbd5a3 (a94602c1)\n[   67.848613] ---[ end trace 585a97036f88203a ]---(CVE-2023-52899)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nscsi: mpt3sas: Avoid test/set_bit() operating in non-allocated memory\n\nThere is a potential out-of-bounds access when using test_bit() on a single\nword. The test_bit() and set_bit() functions operate on long values, and\nwhen testing or setting a single word, they can exceed the word\nboundary. KASAN detects this issue and produces a dump:\n\n\t BUG: KASAN: slab-out-of-bounds in _scsih_add_device.constprop.0 (./arch/x86/include/asm/bitops.h:60 ./include/asm-generic/bitops/instrumented-atomic.h:29 drivers/scsi/mpt3sas/mpt3sas_scsih.c:7331) mpt3sas\n\n\t Write of size 8 at addr ffff8881d26e3c60 by task kworker/u1536:2/2965\n\nFor full log, please look at [1].\n\nMake the allocation at least the size of sizeof(unsigned long) so that\nset_bit() and test_bit() have sufficient room for read/write operations\nwithout overwriting unallocated memory.\n\n[1] Link: https://lore.kernel.org/all/ZkNcALr3W3KGYYJG@gmail.com/(CVE-2024-40901)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nmm: avoid overflows in dirty throttling logic\n\nThe dirty throttling logic is interspersed with assumptions that dirty\nlimits in PAGE_SIZE units fit into 32-bit (so that various multiplications\nfit into 64-bits).  If limits end up being larger, we will hit overflows,\npossible divisions by 0 etc.  Fix these problems by never allowing so\nlarge dirty limits as they have dubious practical value anyway.  For\ndirty_bytes / dirty_background_bytes interfaces we can just refuse to set\nso large limits.  For dirty_ratio / dirty_background_ratio it isn't so\nsimple as the dirty limit is computed from the amount of available memory\nwhich can change due to memory hotplug etc.  So when converting dirty\nlimits from ratios to numbers of pages, we just don't allow the result to\nexceed UINT_MAX.\n\nThis is root-only triggerable problem which occurs when the operator\nsets dirty limits to >16 TB.(CVE-2024-42131)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nscsi: qla2xxx: validate nvme_local_port correctly\n\nThe driver load failed with error message,\n\nqla2xxx [0000:04:00.0]-ffff:0: register_localport failed: ret=ffffffef\n\nand with a kernel crash,\n\n\tBUG: unable to handle kernel NULL pointer dereference at 0000000000000070\n\tWorkqueue: events_unbound qla_register_fcport_fn [qla2xxx]\n\tRIP: 0010:nvme_fc_register_remoteport+0x16/0x430 [nvme_fc]\n\tRSP: 0018:ffffaaa040eb3d98 EFLAGS: 00010282\n\tRAX: 0000000000000000 RBX: ffff9dfb46b78c00 RCX: 0000000000000000\n\tRDX: ffff9dfb46b78da8 RSI: ffffaaa040eb3e08 RDI: 0000000000000000\n\tRBP: ffff9dfb612a0a58 R08: ffffffffaf1d6270 R09: 3a34303a30303030\n\tR10: 34303a303030305b R11: 2078787832616c71 R12: ffff9dfb46b78dd4\n\tR13: ffff9dfb46b78c24 R14: ffff9dfb41525300 R15: ffff9dfb46b78da8\n\tFS:  0000000000000000(0000) GS:ffff9dfc67c00000(0000) knlGS:0000000000000000\n\tCS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n\tCR2: 0000000000000070 CR3: 000000018da10004 CR4: 00000000000206f0\n\tCall Trace:\n\tqla_nvme_register_remote+0xeb/0x1f0 [qla2xxx]\n\t? qla2x00_dfs_create_rport+0x231/0x270 [qla2xxx]\n\tqla2x00_update_fcport+0x2a1/0x3c0 [qla2xxx]\n\tqla_register_fcport_fn+0x54/0xc0 [qla2xxx]\n\nExit the qla_nvme_register_remote() function when qla_nvme_register_hba()\nfails and correctly validate nvme_local_port.(CVE-2024-42286)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nkobject_uevent: Fix OOB access within zap_modalias_env()\n\nzap_modalias_env() wrongly calculates size of memory block to move, so\nwill cause OOB memory access issue if variable MODALIAS is not the last\none within its @env parameter, fixed by correcting size to memmove.(CVE-2024-42292)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nhfs: fix to initialize fields of hfs_inode_info after hfs_alloc_inode()\n\nSyzbot reports uninitialized value access issue as below:\n\nloop0: detected capacity change from 0 to 64\n=====================================================\nBUG: KMSAN: uninit-value in hfs_revalidate_dentry+0x307/0x3f0 fs/hfs/sysdep.c:30\n hfs_revalidate_dentry+0x307/0x3f0 fs/hfs/sysdep.c:30\n d_revalidate fs/namei.c:862 [inline]\n lookup_fast+0x89e/0x8e0 fs/namei.c:1649\n walk_component fs/namei.c:2001 [inline]\n link_path_walk+0x817/0x1480 fs/namei.c:2332\n path_lookupat+0xd9/0x6f0 fs/namei.c:2485\n filename_lookup+0x22e/0x740 fs/namei.c:2515\n user_path_at_empty+0x8b/0x390 fs/namei.c:2924\n user_path_at include/linux/namei.h:57 [inline]\n do_mount fs/namespace.c:3689 [inline]\n __do_sys_mount fs/namespace.c:3898 [inline]\n __se_sys_mount+0x66b/0x810 fs/namespace.c:3875\n __x64_sys_mount+0xe4/0x140 fs/namespace.c:3875\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0xcf/0x1e0 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x63/0x6b\n\nBUG: KMSAN: uninit-value in hfs_ext_read_extent fs/hfs/extent.c:196 [inline]\nBUG: KMSAN: uninit-value in hfs_get_block+0x92d/0x1620 fs/hfs/extent.c:366\n hfs_ext_read_extent fs/hfs/extent.c:196 [inline]\n hfs_get_block+0x92d/0x1620 fs/hfs/extent.c:366\n block_read_full_folio+0x4ff/0x11b0 fs/buffer.c:2271\n hfs_read_folio+0x55/0x60 fs/hfs/inode.c:39\n filemap_read_folio+0x148/0x4f0 mm/filemap.c:2426\n do_read_cache_folio+0x7c8/0xd90 mm/filemap.c:3553\n do_read_cache_page mm/filemap.c:3595 [inline]\n read_cache_page+0xfb/0x2f0 mm/filemap.c:3604\n read_mapping_page include/linux/pagemap.h:755 [inline]\n hfs_btree_open+0x928/0x1ae0 fs/hfs/btree.c:78\n hfs_mdb_get+0x260c/0x3000 fs/hfs/mdb.c:204\n hfs_fill_super+0x1fb1/0x2790 fs/hfs/super.c:406\n mount_bdev+0x628/0x920 fs/super.c:1359\n hfs_mount+0xcd/0xe0 fs/hfs/super.c:456\n legacy_get_tree+0x167/0x2e0 fs/fs_context.c:610\n vfs_get_tree+0xdc/0x5d0 fs/super.c:1489\n do_new_mount+0x7a9/0x16f0 fs/namespace.c:3145\n path_mount+0xf98/0x26a0 fs/namespace.c:3475\n do_mount fs/namespace.c:3488 [inline]\n __do_sys_mount fs/namespace.c:3697 [inline]\n __se_sys_mount+0x919/0x9e0 fs/namespace.c:3674\n __ia32_sys_mount+0x15b/0x1b0 fs/namespace.c:3674\n do_syscall_32_irqs_on arch/x86/entry/common.c:112 [inline]\n __do_fast_syscall_32+0xa2/0x100 arch/x86/entry/common.c:178\n do_fast_syscall_32+0x37/0x80 arch/x86/entry/common.c:203\n do_SYSENTER_32+0x1f/0x30 arch/x86/entry/common.c:246\n entry_SYSENTER_compat_after_hwframe+0x70/0x82\n\nUninit was created at:\n __alloc_pages+0x9a6/0xe00 mm/page_alloc.c:4590\n __alloc_pages_node include/linux/gfp.h:238 [inline]\n alloc_pages_node include/linux/gfp.h:261 [inline]\n alloc_slab_page mm/slub.c:2190 [inline]\n allocate_slab mm/slub.c:2354 [inline]\n new_slab+0x2d7/0x1400 mm/slub.c:2407\n ___slab_alloc+0x16b5/0x3970 mm/slub.c:3540\n __slab_alloc mm/slub.c:3625 [inline]\n __slab_alloc_node mm/slub.c:3678 [inline]\n slab_alloc_node mm/slub.c:3850 [inline]\n kmem_cache_alloc_lru+0x64d/0xb30 mm/slub.c:3879\n alloc_inode_sb include/linux/fs.h:3018 [inline]\n hfs_alloc_inode+0x5a/0xc0 fs/hfs/super.c:165\n alloc_inode+0x83/0x440 fs/inode.c:260\n new_inode_pseudo fs/inode.c:1005 [inline]\n new_inode+0x38/0x4f0 fs/inode.c:1031\n hfs_new_inode+0x61/0x1010 fs/hfs/inode.c:186\n hfs_mkdir+0x54/0x250 fs/hfs/dir.c:228\n vfs_mkdir+0x49a/0x700 fs/namei.c:4126\n do_mkdirat+0x529/0x810 fs/namei.c:4149\n __do_sys_mkdirat fs/namei.c:4164 [inline]\n __se_sys_mkdirat fs/namei.c:4162 [inline]\n __x64_sys_mkdirat+0xc8/0x120 fs/namei.c:4162\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0xcf/0x1e0 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x63/0x6b\n\nIt missed to initialize .tz_secondswest, .cached_start and .cached_blocks\nfields in struct hfs_inode_info after hfs_alloc_inode(), fix it.(CVE-2024-42311)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nsysctl: always initialize i_uid/i_gid\n\nAlways initialize i_uid/i_gid inside the sysfs core so set_ownership()\ncan safely skip setting them.\n\nCommit 5ec27ec735ba (\"fs/proc/proc_sysctl.c: fix the default values of\ni_uid/i_gid on /proc/sys inodes.\") added defaults for i_uid/i_gid when\nset_ownership() was not implemented. It also missed adjusting\nnet_ctl_set_ownership() to use the same default values in case the\ncomputation of a better value failed.(CVE-2024-42312)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nusb: vhci-hcd: Do not drop references before new references are gained\n\nAt a few places the driver carries stale pointers\nto references that can still be used. Make sure that does not happen.\nThis strictly speaking closes ZDI-CAN-22273, though there may be\nsimilar races in the driver.(CVE-2024-43883)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\ntracing: Fix overflow in get_free_elt()\n\n\"tracing_map->next_elt\" in get_free_elt() is at risk of overflowing.\n\nOnce it overflows, new elements can still be inserted into the tracing_map\neven though the maximum number of elements (`max_elts`) has been reached.\nContinuing to insert elements after the overflow could result in the\ntracing_map containing \"tracing_map->max_size\" elements, leaving no empty\nentries.\nIf any attempt is made to insert an element into a full tracing_map using\n`__tracing_map_insert()`, it will cause an infinite loop with preemption\ndisabled, leading to a CPU hang problem.\n\nFix this by preventing any further increments to \"tracing_map->next_elt\"\nonce it reaches \"tracing_map->max_elt\".(CVE-2024-43890)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nmedia: xc2028: avoid use-after-free in load_firmware_cb()\n\nsyzkaller reported use-after-free in load_firmware_cb() [1].\nThe reason is because the module allocated a struct tuner in tuner_probe(),\nand then the module initialization failed, the struct tuner was released.\nA worker which created during module initialization accesses this struct\ntuner later, it caused use-after-free.\n\nThe process is as follows:\n\ntask-6504           worker_thread\ntuner_probe                             <= alloc dvb_frontend [2]\n...\nrequest_firmware_nowait                 <= create a worker\n...\ntuner_remove                            <= free dvb_frontend\n...\n                    request_firmware_work_func  <= the firmware is ready\n                    load_firmware_cb    <= but now the dvb_frontend has been freed\n\nTo fix the issue, check the dvd_frontend in load_firmware_cb(), if it is\nnull, report a warning and just return.\n\n[1]:\n    ==================================================================\n     BUG: KASAN: use-after-free in load_firmware_cb+0x1310/0x17a0\n     Read of size 8 at addr ffff8000d7ca2308 by task kworker/2:3/6504\n\n     Call trace:\n      load_firmware_cb+0x1310/0x17a0\n      request_firmware_work_func+0x128/0x220\n      process_one_work+0x770/0x1824\n      worker_thread+0x488/0xea0\n      kthread+0x300/0x430\n      ret_from_fork+0x10/0x20\n\n     Allocated by task 6504:\n      kzalloc\n      tuner_probe+0xb0/0x1430\n      i2c_device_probe+0x92c/0xaf0\n      really_probe+0x678/0xcd0\n      driver_probe_device+0x280/0x370\n      __device_attach_driver+0x220/0x330\n      bus_for_each_drv+0x134/0x1c0\n      __device_attach+0x1f4/0x410\n      device_initial_probe+0x20/0x30\n      bus_probe_device+0x184/0x200\n      device_add+0x924/0x12c0\n      device_register+0x24/0x30\n      i2c_new_device+0x4e0/0xc44\n      v4l2_i2c_new_subdev_board+0xbc/0x290\n      v4l2_i2c_new_subdev+0xc8/0x104\n      em28xx_v4l2_init+0x1dd0/0x3770\n\n     Freed by task 6504:\n      kfree+0x238/0x4e4\n      tuner_remove+0x144/0x1c0\n      i2c_device_remove+0xc8/0x290\n      __device_release_driver+0x314/0x5fc\n      device_release_driver+0x30/0x44\n      bus_remove_device+0x244/0x490\n      device_del+0x350/0x900\n      device_unregister+0x28/0xd0\n      i2c_unregister_device+0x174/0x1d0\n      v4l2_device_unregister+0x224/0x380\n      em28xx_v4l2_init+0x1d90/0x3770\n\n     The buggy address belongs to the object at ffff8000d7ca2000\n      which belongs to the cache kmalloc-2k of size 2048\n     The buggy address is located 776 bytes inside of\n      2048-byte region [ffff8000d7ca2000, ffff8000d7ca2800)\n     The buggy address belongs to the page:\n     page:ffff7fe00035f280 count:1 mapcount:0 mapping:ffff8000c001f000 index:0x0\n     flags: 0x7ff800000000100(slab)\n     raw: 07ff800000000100 ffff7fe00049d880 0000000300000003 ffff8000c001f000\n     raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000\n     page dumped because: kasan: bad access detected\n\n     Memory state around the buggy address:\n      ffff8000d7ca2200: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb\n      ffff8000d7ca2280: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb\n     >ffff8000d7ca2300: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb\n                           ^\n      ffff8000d7ca2380: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb\n      ffff8000d7ca2400: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb\n     ==================================================================\n\n[2]\n    Actually, it is allocated for struct tuner, and dvb_frontend is inside.(CVE-2024-43900)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: ctnetlink: use helper function to calculate expect ID\n\nDelete expectation path is missing a call to the nf_expect_get_id()\nhelper function to calculate the expectation ID, otherwise LSB of the\nexpectation object address is leaked to userspace.(CVE-2024-44944)",
				"category":"general",
				"title":"Description"
			},
			{
				"text":"An update for kernel is now available for openEuler-20.03-LTS-SP4.\n\nopenEuler Security has rated this update as having a security impact of high. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.",
				"category":"general",
				"title":"Topic"
			},
			{
				"text":"High",
				"category":"general",
				"title":"Severity"
			},
			{
				"text":"kernel",
				"category":"general",
				"title":"Affected Component"
			}
		],
		"publisher":{
			"issuing_authority":"openEuler security committee",
			"name":"openEuler",
			"namespace":"https://www.openeuler.org",
			"contact_details":"openeuler-security@openeuler.org",
			"category":"vendor"
		},
		"references":[
			{
				"summary":"openEuler-SA-2024-2109",
				"category":"self",
				"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2109"
			},
			{
				"summary":"CVE-2022-48877",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2022-48877&packageName=kernel"
			},
			{
				"summary":"CVE-2022-48891",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2022-48891&packageName=kernel"
			},
			{
				"summary":"CVE-2022-48908",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2022-48908&packageName=kernel"
			},
			{
				"summary":"CVE-2022-48937",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2022-48937&packageName=kernel"
			},
			{
				"summary":"CVE-2023-52899",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2023-52899&packageName=kernel"
			},
			{
				"summary":"CVE-2024-40901",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-40901&packageName=kernel"
			},
			{
				"summary":"CVE-2024-42131",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-42131&packageName=kernel"
			},
			{
				"summary":"CVE-2024-42286",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-42286&packageName=kernel"
			},
			{
				"summary":"CVE-2024-42292",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-42292&packageName=kernel"
			},
			{
				"summary":"CVE-2024-42311",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-42311&packageName=kernel"
			},
			{
				"summary":"CVE-2024-42312",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-42312&packageName=kernel"
			},
			{
				"summary":"CVE-2024-43883",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-43883&packageName=kernel"
			},
			{
				"summary":"CVE-2024-43890",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-43890&packageName=kernel"
			},
			{
				"summary":"CVE-2024-43900",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-43900&packageName=kernel"
			},
			{
				"summary":"CVE-2024-44944",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-44944&packageName=kernel"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-48877"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-48891"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-48908"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-48937"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52899"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-40901"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-42131"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-42286"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-42292"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-42311"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-42312"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-43883"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-43890"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-43900"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-44944"
			},
			{
				"summary":"openEuler-SA-2024-2109 vex file",
				"category":"self",
				"url":"https://repo.openeuler.org/security/data/csaf/advisories/2024/csaf-openeuler-sa-2024-2109.json"
			}
		],
		"title":"An update for kernel is now available for openEuler-20.03-LTS-SP4",
		"tracking":{
			"initial_release_date":"2024-09-06T20:08:25+08:00",
			"revision_history":[
				{
					"date":"2024-09-06T20:08:25+08:00",
					"summary":"Initial",
					"number":"1.0.0"
				}
			],
			"generator":{
				"date":"2024-09-06T20:08:25+08:00",
				"engine":{
					"name":"openEuler CSAF Tool V1.0"
				}
			},
			"current_release_date":"2024-09-06T20:08:25+08:00",
			"id":"openEuler-SA-2024-2109",
			"version":"1.0.0",
			"status":"final"
		}
	},
	"product_tree":{
		"branches":[
			{
				"name":"openEuler",
				"category":"vendor",
				"branches":[
					{
						"name":"openEuler",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:20.03-LTS-SP4"
									},
									"product_id":"openEuler-20.03-LTS-SP4",
									"name":"openEuler-20.03-LTS-SP4"
								},
								"name":"openEuler-20.03-LTS-SP4",
								"category":"product_version"
							}
						],
						"category":"product_name"
					},
					{
						"name":"aarch64",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:20.03-LTS-SP4"
									},
									"product_id":"bpftool-4.19.90-2409.1.0.0293.oe2003sp4.aarch64.rpm",
									"name":"bpftool-4.19.90-2409.1.0.0293.oe2003sp4.aarch64.rpm"
								},
								"name":"bpftool-4.19.90-2409.1.0.0293.oe2003sp4.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:20.03-LTS-SP4"
									},
									"product_id":"bpftool-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64.rpm",
									"name":"bpftool-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64.rpm"
								},
								"name":"bpftool-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:20.03-LTS-SP4"
									},
									"product_id":"kernel-4.19.90-2409.1.0.0293.oe2003sp4.aarch64.rpm",
									"name":"kernel-4.19.90-2409.1.0.0293.oe2003sp4.aarch64.rpm"
								},
								"name":"kernel-4.19.90-2409.1.0.0293.oe2003sp4.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:20.03-LTS-SP4"
									},
									"product_id":"kernel-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64.rpm",
									"name":"kernel-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64.rpm"
								},
								"name":"kernel-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:20.03-LTS-SP4"
									},
									"product_id":"kernel-debugsource-4.19.90-2409.1.0.0293.oe2003sp4.aarch64.rpm",
									"name":"kernel-debugsource-4.19.90-2409.1.0.0293.oe2003sp4.aarch64.rpm"
								},
								"name":"kernel-debugsource-4.19.90-2409.1.0.0293.oe2003sp4.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:20.03-LTS-SP4"
									},
									"product_id":"kernel-devel-4.19.90-2409.1.0.0293.oe2003sp4.aarch64.rpm",
									"name":"kernel-devel-4.19.90-2409.1.0.0293.oe2003sp4.aarch64.rpm"
								},
								"name":"kernel-devel-4.19.90-2409.1.0.0293.oe2003sp4.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:20.03-LTS-SP4"
									},
									"product_id":"kernel-source-4.19.90-2409.1.0.0293.oe2003sp4.aarch64.rpm",
									"name":"kernel-source-4.19.90-2409.1.0.0293.oe2003sp4.aarch64.rpm"
								},
								"name":"kernel-source-4.19.90-2409.1.0.0293.oe2003sp4.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:20.03-LTS-SP4"
									},
									"product_id":"kernel-tools-4.19.90-2409.1.0.0293.oe2003sp4.aarch64.rpm",
									"name":"kernel-tools-4.19.90-2409.1.0.0293.oe2003sp4.aarch64.rpm"
								},
								"name":"kernel-tools-4.19.90-2409.1.0.0293.oe2003sp4.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:20.03-LTS-SP4"
									},
									"product_id":"kernel-tools-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64.rpm",
									"name":"kernel-tools-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64.rpm"
								},
								"name":"kernel-tools-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:20.03-LTS-SP4"
									},
									"product_id":"kernel-tools-devel-4.19.90-2409.1.0.0293.oe2003sp4.aarch64.rpm",
									"name":"kernel-tools-devel-4.19.90-2409.1.0.0293.oe2003sp4.aarch64.rpm"
								},
								"name":"kernel-tools-devel-4.19.90-2409.1.0.0293.oe2003sp4.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:20.03-LTS-SP4"
									},
									"product_id":"perf-4.19.90-2409.1.0.0293.oe2003sp4.aarch64.rpm",
									"name":"perf-4.19.90-2409.1.0.0293.oe2003sp4.aarch64.rpm"
								},
								"name":"perf-4.19.90-2409.1.0.0293.oe2003sp4.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:20.03-LTS-SP4"
									},
									"product_id":"perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64.rpm",
									"name":"perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64.rpm"
								},
								"name":"perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:20.03-LTS-SP4"
									},
									"product_id":"python2-perf-4.19.90-2409.1.0.0293.oe2003sp4.aarch64.rpm",
									"name":"python2-perf-4.19.90-2409.1.0.0293.oe2003sp4.aarch64.rpm"
								},
								"name":"python2-perf-4.19.90-2409.1.0.0293.oe2003sp4.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:20.03-LTS-SP4"
									},
									"product_id":"python2-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64.rpm",
									"name":"python2-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64.rpm"
								},
								"name":"python2-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:20.03-LTS-SP4"
									},
									"product_id":"python3-perf-4.19.90-2409.1.0.0293.oe2003sp4.aarch64.rpm",
									"name":"python3-perf-4.19.90-2409.1.0.0293.oe2003sp4.aarch64.rpm"
								},
								"name":"python3-perf-4.19.90-2409.1.0.0293.oe2003sp4.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:20.03-LTS-SP4"
									},
									"product_id":"python3-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64.rpm",
									"name":"python3-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64.rpm"
								},
								"name":"python3-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64.rpm",
								"category":"product_version"
							}
						],
						"category":"architecture"
					},
					{
						"name":"x86_64",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:20.03-LTS-SP4"
									},
									"product_id":"bpftool-4.19.90-2409.1.0.0293.oe2003sp4.x86_64.rpm",
									"name":"bpftool-4.19.90-2409.1.0.0293.oe2003sp4.x86_64.rpm"
								},
								"name":"bpftool-4.19.90-2409.1.0.0293.oe2003sp4.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:20.03-LTS-SP4"
									},
									"product_id":"bpftool-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64.rpm",
									"name":"bpftool-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64.rpm"
								},
								"name":"bpftool-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:20.03-LTS-SP4"
									},
									"product_id":"kernel-4.19.90-2409.1.0.0293.oe2003sp4.x86_64.rpm",
									"name":"kernel-4.19.90-2409.1.0.0293.oe2003sp4.x86_64.rpm"
								},
								"name":"kernel-4.19.90-2409.1.0.0293.oe2003sp4.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:20.03-LTS-SP4"
									},
									"product_id":"kernel-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64.rpm",
									"name":"kernel-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64.rpm"
								},
								"name":"kernel-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:20.03-LTS-SP4"
									},
									"product_id":"kernel-debugsource-4.19.90-2409.1.0.0293.oe2003sp4.x86_64.rpm",
									"name":"kernel-debugsource-4.19.90-2409.1.0.0293.oe2003sp4.x86_64.rpm"
								},
								"name":"kernel-debugsource-4.19.90-2409.1.0.0293.oe2003sp4.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:20.03-LTS-SP4"
									},
									"product_id":"kernel-devel-4.19.90-2409.1.0.0293.oe2003sp4.x86_64.rpm",
									"name":"kernel-devel-4.19.90-2409.1.0.0293.oe2003sp4.x86_64.rpm"
								},
								"name":"kernel-devel-4.19.90-2409.1.0.0293.oe2003sp4.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:20.03-LTS-SP4"
									},
									"product_id":"kernel-source-4.19.90-2409.1.0.0293.oe2003sp4.x86_64.rpm",
									"name":"kernel-source-4.19.90-2409.1.0.0293.oe2003sp4.x86_64.rpm"
								},
								"name":"kernel-source-4.19.90-2409.1.0.0293.oe2003sp4.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:20.03-LTS-SP4"
									},
									"product_id":"kernel-tools-4.19.90-2409.1.0.0293.oe2003sp4.x86_64.rpm",
									"name":"kernel-tools-4.19.90-2409.1.0.0293.oe2003sp4.x86_64.rpm"
								},
								"name":"kernel-tools-4.19.90-2409.1.0.0293.oe2003sp4.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:20.03-LTS-SP4"
									},
									"product_id":"kernel-tools-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64.rpm",
									"name":"kernel-tools-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64.rpm"
								},
								"name":"kernel-tools-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:20.03-LTS-SP4"
									},
									"product_id":"kernel-tools-devel-4.19.90-2409.1.0.0293.oe2003sp4.x86_64.rpm",
									"name":"kernel-tools-devel-4.19.90-2409.1.0.0293.oe2003sp4.x86_64.rpm"
								},
								"name":"kernel-tools-devel-4.19.90-2409.1.0.0293.oe2003sp4.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:20.03-LTS-SP4"
									},
									"product_id":"perf-4.19.90-2409.1.0.0293.oe2003sp4.x86_64.rpm",
									"name":"perf-4.19.90-2409.1.0.0293.oe2003sp4.x86_64.rpm"
								},
								"name":"perf-4.19.90-2409.1.0.0293.oe2003sp4.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:20.03-LTS-SP4"
									},
									"product_id":"perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64.rpm",
									"name":"perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64.rpm"
								},
								"name":"perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:20.03-LTS-SP4"
									},
									"product_id":"python2-perf-4.19.90-2409.1.0.0293.oe2003sp4.x86_64.rpm",
									"name":"python2-perf-4.19.90-2409.1.0.0293.oe2003sp4.x86_64.rpm"
								},
								"name":"python2-perf-4.19.90-2409.1.0.0293.oe2003sp4.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:20.03-LTS-SP4"
									},
									"product_id":"python2-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64.rpm",
									"name":"python2-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64.rpm"
								},
								"name":"python2-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:20.03-LTS-SP4"
									},
									"product_id":"python3-perf-4.19.90-2409.1.0.0293.oe2003sp4.x86_64.rpm",
									"name":"python3-perf-4.19.90-2409.1.0.0293.oe2003sp4.x86_64.rpm"
								},
								"name":"python3-perf-4.19.90-2409.1.0.0293.oe2003sp4.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:20.03-LTS-SP4"
									},
									"product_id":"python3-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64.rpm",
									"name":"python3-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64.rpm"
								},
								"name":"python3-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64.rpm",
								"category":"product_version"
							}
						],
						"category":"architecture"
					},
					{
						"name":"src",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:20.03-LTS-SP4"
									},
									"product_id":"kernel-4.19.90-2409.1.0.0293.oe2003sp4.src.rpm",
									"name":"kernel-4.19.90-2409.1.0.0293.oe2003sp4.src.rpm"
								},
								"name":"kernel-4.19.90-2409.1.0.0293.oe2003sp4.src.rpm",
								"category":"product_version"
							}
						],
						"category":"architecture"
					}
				]
			}
		],
		"relationships":[
			{
				"relates_to_product_reference":"openEuler-20.03-LTS-SP4",
				"product_reference":"bpftool-4.19.90-2409.1.0.0293.oe2003sp4.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-20.03-LTS-SP4:bpftool-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"name":"bpftool-4.19.90-2409.1.0.0293.oe2003sp4.aarch64 as a component of openEuler-20.03-LTS-SP4"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-20.03-LTS-SP4",
				"product_reference":"bpftool-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-20.03-LTS-SP4:bpftool-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"name":"bpftool-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64 as a component of openEuler-20.03-LTS-SP4"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-20.03-LTS-SP4",
				"product_reference":"kernel-4.19.90-2409.1.0.0293.oe2003sp4.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-20.03-LTS-SP4:kernel-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"name":"kernel-4.19.90-2409.1.0.0293.oe2003sp4.aarch64 as a component of openEuler-20.03-LTS-SP4"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-20.03-LTS-SP4",
				"product_reference":"kernel-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-20.03-LTS-SP4:kernel-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"name":"kernel-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64 as a component of openEuler-20.03-LTS-SP4"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-20.03-LTS-SP4",
				"product_reference":"kernel-debugsource-4.19.90-2409.1.0.0293.oe2003sp4.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-20.03-LTS-SP4:kernel-debugsource-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"name":"kernel-debugsource-4.19.90-2409.1.0.0293.oe2003sp4.aarch64 as a component of openEuler-20.03-LTS-SP4"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-20.03-LTS-SP4",
				"product_reference":"kernel-devel-4.19.90-2409.1.0.0293.oe2003sp4.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-20.03-LTS-SP4:kernel-devel-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"name":"kernel-devel-4.19.90-2409.1.0.0293.oe2003sp4.aarch64 as a component of openEuler-20.03-LTS-SP4"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-20.03-LTS-SP4",
				"product_reference":"kernel-source-4.19.90-2409.1.0.0293.oe2003sp4.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-20.03-LTS-SP4:kernel-source-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"name":"kernel-source-4.19.90-2409.1.0.0293.oe2003sp4.aarch64 as a component of openEuler-20.03-LTS-SP4"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-20.03-LTS-SP4",
				"product_reference":"kernel-tools-4.19.90-2409.1.0.0293.oe2003sp4.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-20.03-LTS-SP4:kernel-tools-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"name":"kernel-tools-4.19.90-2409.1.0.0293.oe2003sp4.aarch64 as a component of openEuler-20.03-LTS-SP4"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-20.03-LTS-SP4",
				"product_reference":"kernel-tools-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-20.03-LTS-SP4:kernel-tools-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"name":"kernel-tools-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64 as a component of openEuler-20.03-LTS-SP4"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-20.03-LTS-SP4",
				"product_reference":"kernel-tools-devel-4.19.90-2409.1.0.0293.oe2003sp4.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-20.03-LTS-SP4:kernel-tools-devel-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"name":"kernel-tools-devel-4.19.90-2409.1.0.0293.oe2003sp4.aarch64 as a component of openEuler-20.03-LTS-SP4"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-20.03-LTS-SP4",
				"product_reference":"perf-4.19.90-2409.1.0.0293.oe2003sp4.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-20.03-LTS-SP4:perf-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"name":"perf-4.19.90-2409.1.0.0293.oe2003sp4.aarch64 as a component of openEuler-20.03-LTS-SP4"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-20.03-LTS-SP4",
				"product_reference":"perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-20.03-LTS-SP4:perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"name":"perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64 as a component of openEuler-20.03-LTS-SP4"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-20.03-LTS-SP4",
				"product_reference":"python2-perf-4.19.90-2409.1.0.0293.oe2003sp4.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-20.03-LTS-SP4:python2-perf-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"name":"python2-perf-4.19.90-2409.1.0.0293.oe2003sp4.aarch64 as a component of openEuler-20.03-LTS-SP4"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-20.03-LTS-SP4",
				"product_reference":"python2-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-20.03-LTS-SP4:python2-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"name":"python2-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64 as a component of openEuler-20.03-LTS-SP4"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-20.03-LTS-SP4",
				"product_reference":"python3-perf-4.19.90-2409.1.0.0293.oe2003sp4.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-20.03-LTS-SP4:python3-perf-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"name":"python3-perf-4.19.90-2409.1.0.0293.oe2003sp4.aarch64 as a component of openEuler-20.03-LTS-SP4"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-20.03-LTS-SP4",
				"product_reference":"python3-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-20.03-LTS-SP4:python3-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"name":"python3-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64 as a component of openEuler-20.03-LTS-SP4"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-20.03-LTS-SP4",
				"product_reference":"bpftool-4.19.90-2409.1.0.0293.oe2003sp4.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-20.03-LTS-SP4:bpftool-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"name":"bpftool-4.19.90-2409.1.0.0293.oe2003sp4.x86_64 as a component of openEuler-20.03-LTS-SP4"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-20.03-LTS-SP4",
				"product_reference":"bpftool-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-20.03-LTS-SP4:bpftool-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"name":"bpftool-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64 as a component of openEuler-20.03-LTS-SP4"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-20.03-LTS-SP4",
				"product_reference":"kernel-4.19.90-2409.1.0.0293.oe2003sp4.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-20.03-LTS-SP4:kernel-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"name":"kernel-4.19.90-2409.1.0.0293.oe2003sp4.x86_64 as a component of openEuler-20.03-LTS-SP4"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-20.03-LTS-SP4",
				"product_reference":"kernel-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-20.03-LTS-SP4:kernel-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"name":"kernel-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64 as a component of openEuler-20.03-LTS-SP4"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-20.03-LTS-SP4",
				"product_reference":"kernel-debugsource-4.19.90-2409.1.0.0293.oe2003sp4.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-20.03-LTS-SP4:kernel-debugsource-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"name":"kernel-debugsource-4.19.90-2409.1.0.0293.oe2003sp4.x86_64 as a component of openEuler-20.03-LTS-SP4"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-20.03-LTS-SP4",
				"product_reference":"kernel-devel-4.19.90-2409.1.0.0293.oe2003sp4.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-20.03-LTS-SP4:kernel-devel-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"name":"kernel-devel-4.19.90-2409.1.0.0293.oe2003sp4.x86_64 as a component of openEuler-20.03-LTS-SP4"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-20.03-LTS-SP4",
				"product_reference":"kernel-source-4.19.90-2409.1.0.0293.oe2003sp4.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-20.03-LTS-SP4:kernel-source-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"name":"kernel-source-4.19.90-2409.1.0.0293.oe2003sp4.x86_64 as a component of openEuler-20.03-LTS-SP4"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-20.03-LTS-SP4",
				"product_reference":"kernel-tools-4.19.90-2409.1.0.0293.oe2003sp4.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-20.03-LTS-SP4:kernel-tools-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"name":"kernel-tools-4.19.90-2409.1.0.0293.oe2003sp4.x86_64 as a component of openEuler-20.03-LTS-SP4"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-20.03-LTS-SP4",
				"product_reference":"kernel-tools-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-20.03-LTS-SP4:kernel-tools-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"name":"kernel-tools-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64 as a component of openEuler-20.03-LTS-SP4"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-20.03-LTS-SP4",
				"product_reference":"kernel-tools-devel-4.19.90-2409.1.0.0293.oe2003sp4.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-20.03-LTS-SP4:kernel-tools-devel-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"name":"kernel-tools-devel-4.19.90-2409.1.0.0293.oe2003sp4.x86_64 as a component of openEuler-20.03-LTS-SP4"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-20.03-LTS-SP4",
				"product_reference":"perf-4.19.90-2409.1.0.0293.oe2003sp4.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-20.03-LTS-SP4:perf-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"name":"perf-4.19.90-2409.1.0.0293.oe2003sp4.x86_64 as a component of openEuler-20.03-LTS-SP4"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-20.03-LTS-SP4",
				"product_reference":"perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-20.03-LTS-SP4:perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"name":"perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64 as a component of openEuler-20.03-LTS-SP4"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-20.03-LTS-SP4",
				"product_reference":"python2-perf-4.19.90-2409.1.0.0293.oe2003sp4.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-20.03-LTS-SP4:python2-perf-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"name":"python2-perf-4.19.90-2409.1.0.0293.oe2003sp4.x86_64 as a component of openEuler-20.03-LTS-SP4"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-20.03-LTS-SP4",
				"product_reference":"python2-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-20.03-LTS-SP4:python2-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"name":"python2-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64 as a component of openEuler-20.03-LTS-SP4"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-20.03-LTS-SP4",
				"product_reference":"python3-perf-4.19.90-2409.1.0.0293.oe2003sp4.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-20.03-LTS-SP4:python3-perf-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"name":"python3-perf-4.19.90-2409.1.0.0293.oe2003sp4.x86_64 as a component of openEuler-20.03-LTS-SP4"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-20.03-LTS-SP4",
				"product_reference":"python3-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-20.03-LTS-SP4:python3-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"name":"python3-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64 as a component of openEuler-20.03-LTS-SP4"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-20.03-LTS-SP4",
				"product_reference":"kernel-4.19.90-2409.1.0.0293.oe2003sp4.src.rpm",
				"full_product_name":{
					"product_id":"openEuler-20.03-LTS-SP4:kernel-4.19.90-2409.1.0.0293.oe2003sp4.src",
					"name":"kernel-4.19.90-2409.1.0.0293.oe2003sp4.src as a component of openEuler-20.03-LTS-SP4"
				},
				"category":"default_component_of"
			}
		]
	},
	"vulnerabilities":[
		{
			"cve":"CVE-2022-48877",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nf2fs: let's avoid panic if extent_tree is not created\n\nThis patch avoids the below panic.\n\npc : __lookup_extent_tree+0xd8/0x760\nlr : f2fs_do_write_data_page+0x104/0x87c\nsp : ffffffc010cbb3c0\nx29: ffffffc010cbb3e0 x28: 0000000000000000\nx27: ffffff8803e7f020 x26: ffffff8803e7ed40\nx25: ffffff8803e7f020 x24: ffffffc010cbb460\nx23: ffffffc010cbb480 x22: 0000000000000000\nx21: 0000000000000000 x20: ffffffff22e90900\nx19: 0000000000000000 x18: ffffffc010c5d080\nx17: 0000000000000000 x16: 0000000000000020\nx15: ffffffdb1acdbb88 x14: ffffff888759e2b0\nx13: 0000000000000000 x12: ffffff802da49000\nx11: 000000000a001200 x10: ffffff8803e7ed40\nx9 : ffffff8023195800 x8 : ffffff802da49078\nx7 : 0000000000000001 x6 : 0000000000000000\nx5 : 0000000000000006 x4 : ffffffc010cbba28\nx3 : 0000000000000000 x2 : ffffffc010cbb480\nx1 : 0000000000000000 x0 : ffffff8803e7ed40\nCall trace:\n __lookup_extent_tree+0xd8/0x760\n f2fs_do_write_data_page+0x104/0x87c\n f2fs_write_single_data_page+0x420/0xb60\n f2fs_write_cache_pages+0x418/0xb1c\n __f2fs_write_data_pages+0x428/0x58c\n f2fs_write_data_pages+0x30/0x40\n do_writepages+0x88/0x190\n __writeback_single_inode+0x48/0x448\n writeback_sb_inodes+0x468/0x9e8\n __writeback_inodes_wb+0xb8/0x2a4\n wb_writeback+0x33c/0x740\n wb_do_writeback+0x2b4/0x400\n wb_workfn+0xe4/0x34c\n process_one_work+0x24c/0x5bc\n worker_thread+0x3e8/0xa50\n kthread+0x150/0x1b4",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-20.03-LTS-SP4:bpftool-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:bpftool-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-debugsource-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-devel-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-source-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-tools-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-tools-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-tools-devel-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:perf-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:python2-perf-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:python2-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:python3-perf-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:python3-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:bpftool-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:bpftool-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-debugsource-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-devel-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-source-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-tools-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-tools-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-tools-devel-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:perf-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:python2-perf-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:python2-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:python3-perf-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:python3-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-4.19.90-2409.1.0.0293.oe2003sp4.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-20.03-LTS-SP4:bpftool-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:bpftool-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-debugsource-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-devel-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-source-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-tools-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-tools-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-tools-devel-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:perf-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python2-perf-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python2-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python3-perf-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python3-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:bpftool-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:bpftool-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-debugsource-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-devel-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-source-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-tools-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-tools-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-tools-devel-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:perf-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python2-perf-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python2-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python3-perf-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python3-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-4.19.90-2409.1.0.0293.oe2003sp4.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2109"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-20.03-LTS-SP4:bpftool-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:bpftool-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-debugsource-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-devel-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-source-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-tools-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-tools-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-tools-devel-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:perf-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python2-perf-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python2-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python3-perf-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python3-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:bpftool-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:bpftool-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-debugsource-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-devel-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-source-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-tools-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-tools-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-tools-devel-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:perf-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python2-perf-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python2-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python3-perf-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python3-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-4.19.90-2409.1.0.0293.oe2003sp4.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2022-48877"
		},
		{
			"cve":"CVE-2022-48891",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nregulator: da9211: Use irq handler when ready\n\nIf the system does not come from reset (like when it is kexec()), the\nregulator might have an IRQ waiting for us.\n\nIf we enable the IRQ handler before its structures are ready, we crash.\n\nThis patch fixes:\n\n[    1.141839] Unable to handle kernel read from unreadable memory at virtual address 0000000000000078\n[    1.316096] Call trace:\n[    1.316101]  blocking_notifier_call_chain+0x20/0xa8\n[    1.322757] cpu cpu0: dummy supplies not allowed for exclusive requests\n[    1.327823]  regulator_notifier_call_chain+0x1c/0x2c\n[    1.327825]  da9211_irq_handler+0x68/0xf8\n[    1.327829]  irq_thread+0x11c/0x234\n[    1.327833]  kthread+0x13c/0x154",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-20.03-LTS-SP4:bpftool-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:bpftool-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-debugsource-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-devel-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-source-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-tools-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-tools-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-tools-devel-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:perf-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:python2-perf-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:python2-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:python3-perf-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:python3-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:bpftool-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:bpftool-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-debugsource-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-devel-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-source-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-tools-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-tools-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-tools-devel-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:perf-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:python2-perf-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:python2-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:python3-perf-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:python3-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-4.19.90-2409.1.0.0293.oe2003sp4.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-20.03-LTS-SP4:bpftool-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:bpftool-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-debugsource-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-devel-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-source-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-tools-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-tools-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-tools-devel-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:perf-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python2-perf-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python2-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python3-perf-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python3-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:bpftool-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:bpftool-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-debugsource-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-devel-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-source-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-tools-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-tools-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-tools-devel-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:perf-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python2-perf-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python2-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python3-perf-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python3-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-4.19.90-2409.1.0.0293.oe2003sp4.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2109"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-20.03-LTS-SP4:bpftool-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:bpftool-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-debugsource-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-devel-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-source-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-tools-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-tools-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-tools-devel-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:perf-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python2-perf-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python2-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python3-perf-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python3-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:bpftool-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:bpftool-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-debugsource-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-devel-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-source-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-tools-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-tools-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-tools-devel-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:perf-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python2-perf-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python2-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python3-perf-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python3-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-4.19.90-2409.1.0.0293.oe2003sp4.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2022-48891"
		},
		{
			"cve":"CVE-2022-48908",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nnet: arcnet: com20020: Fix null-ptr-deref in com20020pci_probe()\n\nDuring driver initialization, the pointer of card info, i.e. the\nvariable 'ci' is required. However, the definition of\n'com20020pci_id_table' reveals that this field is empty for some\ndevices, which will cause null pointer dereference when initializing\nthese devices.\n\nThe following log reveals it:\n\n[    3.973806] KASAN: null-ptr-deref in range [0x0000000000000028-0x000000000000002f]\n[    3.973819] RIP: 0010:com20020pci_probe+0x18d/0x13e0 [com20020_pci]\n[    3.975181] Call Trace:\n[    3.976208]  local_pci_probe+0x13f/0x210\n[    3.977248]  pci_device_probe+0x34c/0x6d0\n[    3.977255]  ? pci_uevent+0x470/0x470\n[    3.978265]  really_probe+0x24c/0x8d0\n[    3.978273]  __driver_probe_device+0x1b3/0x280\n[    3.979288]  driver_probe_device+0x50/0x370\n\nFix this by checking whether the 'ci' is a null pointer first.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-20.03-LTS-SP4:bpftool-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:bpftool-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-debugsource-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-devel-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-source-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-tools-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-tools-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-tools-devel-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:perf-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:python2-perf-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:python2-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:python3-perf-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:python3-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:bpftool-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:bpftool-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-debugsource-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-devel-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-source-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-tools-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-tools-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-tools-devel-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:perf-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:python2-perf-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:python2-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:python3-perf-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:python3-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-4.19.90-2409.1.0.0293.oe2003sp4.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-20.03-LTS-SP4:bpftool-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:bpftool-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-debugsource-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-devel-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-source-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-tools-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-tools-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-tools-devel-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:perf-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python2-perf-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python2-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python3-perf-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python3-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:bpftool-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:bpftool-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-debugsource-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-devel-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-source-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-tools-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-tools-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-tools-devel-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:perf-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python2-perf-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python2-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python3-perf-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python3-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-4.19.90-2409.1.0.0293.oe2003sp4.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2109"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":4.4,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-20.03-LTS-SP4:bpftool-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:bpftool-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-debugsource-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-devel-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-source-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-tools-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-tools-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-tools-devel-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:perf-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python2-perf-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python2-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python3-perf-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python3-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:bpftool-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:bpftool-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-debugsource-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-devel-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-source-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-tools-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-tools-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-tools-devel-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:perf-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python2-perf-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python2-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python3-perf-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python3-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-4.19.90-2409.1.0.0293.oe2003sp4.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2022-48908"
		},
		{
			"cve":"CVE-2022-48937",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:io_uring: add a schedule point in io_add_buffers()Looping ~65535 times doing kmalloc() calls can trigger soft lockups,especially with DEBUG features (like KASAN).[  253.536212] watchdog: BUG: soft lockup - CPU#64 stuck for 26s! [b219417889:12575][  253.544433] Modules linked in: vfat fat i2c_mux_pca954x i2c_mux spidev cdc_acm xhci_pci xhci_hcd sha3_generic gq(O)[  253.544451] CPU: 64 PID: 12575 Comm: b219417889 Tainted: G S         O      5.17.0-smp-DEV #801[  253.544457] RIP: 0010:kernel_text_address (./include/asm-generic/sections.h:192 ./include/linux/kallsyms.h:29 kernel/extable.c:67 kernel/extable.c:98)[  253.544464] Code: 0f 93 c0 48 c7 c1 e0 63 d7 a4 48 39 cb 0f 92 c1 20 c1 0f b6 c1 5b 5d c3 90 0f 1f 44 00 00 55 48 89 e5 41 57 41 56 53 48 89 fb <48> c7 c0 00 00 80 a0 41 be 01 00 00 00 48 39 c7 72 0c 48 c7 c0 40[  253.544468] RSP: 0018:ffff8882d8baf4c0 EFLAGS: 00000246[  253.544471] RAX: 1ffff1105b175e00 RBX: ffffffffa13ef09a RCX: 00000000a13ef001[  253.544474] RDX: ffffffffa13ef09a RSI: ffff8882d8baf558 RDI: ffffffffa13ef09a[  253.544476] RBP: ffff8882d8baf4d8 R08: ffff8882d8baf5e0 R09: 0000000000000004[  253.544479] R10: ffff8882d8baf5e8 R11: ffffffffa0d59a50 R12: ffff8882eab20380[  253.544481] R13: ffffffffa0d59a50 R14: dffffc0000000000 R15: 1ffff1105b175eb0[  253.544483] FS:  00000000016d3380(0000) GS:ffff88af48c00000(0000) knlGS:0000000000000000[  253.544486] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033[  253.544488] CR2: 00000000004af0f0 CR3: 00000002eabfa004 CR4: 00000000003706e0[  253.544491] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000[  253.544492] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400[  253.544494] Call Trace:[  253.544496]  <TASK>[  253.544498] ? io_queue_sqe (fs/io_uring.c:7143)[  253.544505] __kernel_text_address (kernel/extable.c:78)[  253.544508] unwind_get_return_address (arch/x86/kernel/unwind_frame.c:19)[  253.544514] arch_stack_walk (arch/x86/kernel/stacktrace.c:27)[  253.544517] ? io_queue_sqe (fs/io_uring.c:7143)[  253.544521] stack_trace_save (kernel/stacktrace.c:123)[  253.544527] ____kasan_kmalloc (mm/kasan/common.c:39 mm/kasan/common.c:45 mm/kasan/common.c:436 mm/kasan/common.c:515)[  253.544531] ? ____kasan_kmalloc (mm/kasan/common.c:39 mm/kasan/common.c:45 mm/kasan/common.c:436 mm/kasan/common.c:515)[  253.544533] ? __kasan_kmalloc (mm/kasan/common.c:524)[  253.544535] ? kmem_cache_alloc_trace (./include/linux/kasan.h:270 mm/slab.c:3567)[  253.544541] ? io_issue_sqe (fs/io_uring.c:4556 fs/io_uring.c:4589 fs/io_uring.c:6828)[  253.544544] ? __io_queue_sqe (fs/io_uring.c:?)[  253.544551] __kasan_kmalloc (mm/kasan/common.c:524)[  253.544553] kmem_cache_alloc_trace (./include/linux/kasan.h:270 mm/slab.c:3567)[  253.544556] ? io_issue_sqe (fs/io_uring.c:4556 fs/io_uring.c:4589 fs/io_uring.c:6828)[  253.544560] io_issue_sqe (fs/io_uring.c:4556 fs/io_uring.c:4589 fs/io_uring.c:6828)[  253.544564] ? __kasan_slab_alloc (mm/kasan/common.c:45 mm/kasan/common.c:436 mm/kasan/common.c:469)[  253.544567] ? __kasan_slab_alloc (mm/kasan/common.c:39 mm/kasan/common.c:45 mm/kasan/common.c:436 mm/kasan/common.c:469)[  253.544569] ? kmem_cache_alloc_bulk (mm/slab.h:732 mm/slab.c:3546)[  253.544573] ? __io_alloc_req_refill (fs/io_uring.c:2078)[  253.544578] ? io_submit_sqes (fs/io_uring.c:7441)[  253.544581] ? __se_sys_io_uring_enter (fs/io_uring.c:10154 fs/io_uring.c:10096)[  253.544584] ? __x64_sys_io_uring_enter (fs/io_uring.c:10096)[  253.544587] ? do_syscall_64 (arch/x86/entry/common.c:50 arch/x86/entry/common.c:80)[  253.544590] ? entry_SYSCALL_64_after_hwframe (??:?)[  253.544596] __io_queue_sqe (fs/io_uring.c:?)[  253.544600] io_queue_sqe (fs/io_uring.c:7143)[  253.544603] io_submit_sqe (fs/io_uring.c:?)[  253.544608] io_submit_sqes (fs/io_uring.c:?)[  253.544612] __se_sys_io_uring_enter (fs/io_uring.c:10154 fs/io_uri---truncated---",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-20.03-LTS-SP4:bpftool-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:bpftool-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-debugsource-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-devel-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-source-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-tools-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-tools-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-tools-devel-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:perf-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:python2-perf-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:python2-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:python3-perf-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:python3-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:bpftool-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:bpftool-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-debugsource-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-devel-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-source-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-tools-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-tools-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-tools-devel-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:perf-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:python2-perf-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:python2-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:python3-perf-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:python3-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-4.19.90-2409.1.0.0293.oe2003sp4.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-20.03-LTS-SP4:bpftool-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:bpftool-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-debugsource-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-devel-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-source-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-tools-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-tools-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-tools-devel-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:perf-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python2-perf-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python2-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python3-perf-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python3-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:bpftool-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:bpftool-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-debugsource-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-devel-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-source-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-tools-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-tools-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-tools-devel-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:perf-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python2-perf-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python2-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python3-perf-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python3-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-4.19.90-2409.1.0.0293.oe2003sp4.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2109"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"LOW",
						"baseScore":3.3,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
						"version":"3.1"
					},
					"products":[
						"openEuler-20.03-LTS-SP4:bpftool-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:bpftool-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-debugsource-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-devel-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-source-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-tools-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-tools-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-tools-devel-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:perf-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python2-perf-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python2-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python3-perf-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python3-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:bpftool-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:bpftool-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-debugsource-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-devel-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-source-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-tools-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-tools-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-tools-devel-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:perf-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python2-perf-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python2-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python3-perf-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python3-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-4.19.90-2409.1.0.0293.oe2003sp4.src"
					]
				}
			],
			"threats":[
				{
					"details":"Low",
					"category":"impact"
				}
			],
			"title":"CVE-2022-48937"
		},
		{
			"cve":"CVE-2023-52899",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nAdd exception protection processing for vd in axi_chan_handle_err function\n\nSince there is no protection for vd, a kernel panic will be\ntriggered here in exceptional cases.\n\nYou can refer to the processing of axi_chan_block_xfer_complete function\n\nThe triggered kernel panic is as follows:\n\n[   67.848444] Unable to handle kernel NULL pointer dereference at virtual address 0000000000000060\n[   67.848447] Mem abort info:\n[   67.848449]   ESR = 0x96000004\n[   67.848451]   EC = 0x25: DABT (current EL), IL = 32 bits\n[   67.848454]   SET = 0, FnV = 0\n[   67.848456]   EA = 0, S1PTW = 0\n[   67.848458] Data abort info:\n[   67.848460]   ISV = 0, ISS = 0x00000004\n[   67.848462]   CM = 0, WnR = 0\n[   67.848465] user pgtable: 4k pages, 48-bit VAs, pgdp=00000800c4c0b000\n[   67.848468] [0000000000000060] pgd=0000000000000000, p4d=0000000000000000\n[   67.848472] Internal error: Oops: 96000004 [#1] SMP\n[   67.848475] Modules linked in: dmatest\n[   67.848479] CPU: 0 PID: 0 Comm: swapper/0 Not tainted 5.10.100-emu_x2rc+ #11\n[   67.848483] pstate: 62000085 (nZCv daIf -PAN -UAO +TCO BTYPE=--)\n[   67.848487] pc : axi_chan_handle_err+0xc4/0x230\n[   67.848491] lr : axi_chan_handle_err+0x30/0x230\n[   67.848493] sp : ffff0803fe55ae50\n[   67.848495] x29: ffff0803fe55ae50 x28: ffff800011212200\n[   67.848500] x27: ffff0800c42c0080 x26: ffff0800c097c080\n[   67.848504] x25: ffff800010d33880 x24: ffff80001139d850\n[   67.848508] x23: ffff0800c097c168 x22: 0000000000000000\n[   67.848512] x21: 0000000000000080 x20: 0000000000002000\n[   67.848517] x19: ffff0800c097c080 x18: 0000000000000000\n[   67.848521] x17: 0000000000000000 x16: 0000000000000000\n[   67.848525] x15: 0000000000000000 x14: 0000000000000000\n[   67.848529] x13: 0000000000000000 x12: 0000000000000040\n[   67.848533] x11: ffff0800c0400248 x10: ffff0800c040024a\n[   67.848538] x9 : ffff800010576cd4 x8 : ffff0800c0400270\n[   67.848542] x7 : 0000000000000000 x6 : ffff0800c04003e0\n[   67.848546] x5 : ffff0800c0400248 x4 : ffff0800c4294480\n[   67.848550] x3 : dead000000000100 x2 : dead000000000122\n[   67.848555] x1 : 0000000000000100 x0 : ffff0800c097c168\n[   67.848559] Call trace:\n[   67.848562]  axi_chan_handle_err+0xc4/0x230\n[   67.848566]  dw_axi_dma_interrupt+0xf4/0x590\n[   67.848569]  __handle_irq_event_percpu+0x60/0x220\n[   67.848573]  handle_irq_event+0x64/0x120\n[   67.848576]  handle_fasteoi_irq+0xc4/0x220\n[   67.848580]  __handle_domain_irq+0x80/0xe0\n[   67.848583]  gic_handle_irq+0xc0/0x138\n[   67.848585]  el1_irq+0xc8/0x180\n[   67.848588]  arch_cpu_idle+0x14/0x2c\n[   67.848591]  default_idle_call+0x40/0x16c\n[   67.848594]  do_idle+0x1f0/0x250\n[   67.848597]  cpu_startup_entry+0x2c/0x60\n[   67.848600]  rest_init+0xc0/0xcc\n[   67.848603]  arch_call_rest_init+0x14/0x1c\n[   67.848606]  start_kernel+0x4cc/0x500\n[   67.848610] Code: eb0002ff 9a9f12d6 f2fbd5a2 f2fbd5a3 (a94602c1)\n[   67.848613] ---[ end trace 585a97036f88203a ]---",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-20.03-LTS-SP4:bpftool-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:bpftool-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-debugsource-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-devel-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-source-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-tools-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-tools-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-tools-devel-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:perf-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:python2-perf-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:python2-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:python3-perf-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:python3-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:bpftool-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:bpftool-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-debugsource-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-devel-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-source-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-tools-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-tools-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-tools-devel-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:perf-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:python2-perf-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:python2-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:python3-perf-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:python3-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-4.19.90-2409.1.0.0293.oe2003sp4.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-20.03-LTS-SP4:bpftool-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:bpftool-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-debugsource-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-devel-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-source-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-tools-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-tools-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-tools-devel-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:perf-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python2-perf-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python2-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python3-perf-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python3-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:bpftool-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:bpftool-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-debugsource-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-devel-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-source-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-tools-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-tools-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-tools-devel-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:perf-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python2-perf-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python2-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python3-perf-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python3-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-4.19.90-2409.1.0.0293.oe2003sp4.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2109"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"LOW",
						"baseScore":3.9,
						"vectorString":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L",
						"version":"3.1"
					},
					"products":[
						"openEuler-20.03-LTS-SP4:bpftool-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:bpftool-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-debugsource-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-devel-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-source-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-tools-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-tools-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-tools-devel-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:perf-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python2-perf-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python2-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python3-perf-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python3-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:bpftool-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:bpftool-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-debugsource-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-devel-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-source-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-tools-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-tools-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-tools-devel-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:perf-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python2-perf-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python2-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python3-perf-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python3-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-4.19.90-2409.1.0.0293.oe2003sp4.src"
					]
				}
			],
			"threats":[
				{
					"details":"Low",
					"category":"impact"
				}
			],
			"title":"CVE-2023-52899"
		},
		{
			"cve":"CVE-2024-40901",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: mpt3sas: Avoid test/set_bit() operating in non-allocated memory\n\nThere is a potential out-of-bounds access when using test_bit() on a single\nword. The test_bit() and set_bit() functions operate on long values, and\nwhen testing or setting a single word, they can exceed the word\nboundary. KASAN detects this issue and produces a dump:\n\n\t BUG: KASAN: slab-out-of-bounds in _scsih_add_device.constprop.0 (./arch/x86/include/asm/bitops.h:60 ./include/asm-generic/bitops/instrumented-atomic.h:29 drivers/scsi/mpt3sas/mpt3sas_scsih.c:7331) mpt3sas\n\n\t Write of size 8 at addr ffff8881d26e3c60 by task kworker/u1536:2/2965\n\nFor full log, please look at [1].\n\nMake the allocation at least the size of sizeof(unsigned long) so that\nset_bit() and test_bit() have sufficient room for read/write operations\nwithout overwriting unallocated memory.\n\n[1] Link: https://lore.kernel.org/all/ZkNcALr3W3KGYYJG@gmail.com/",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-20.03-LTS-SP4:bpftool-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:bpftool-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-debugsource-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-devel-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-source-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-tools-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-tools-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-tools-devel-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:perf-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:python2-perf-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:python2-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:python3-perf-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:python3-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:bpftool-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:bpftool-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-debugsource-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-devel-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-source-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-tools-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-tools-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-tools-devel-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:perf-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:python2-perf-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:python2-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:python3-perf-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:python3-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-4.19.90-2409.1.0.0293.oe2003sp4.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-20.03-LTS-SP4:bpftool-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:bpftool-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-debugsource-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-devel-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-source-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-tools-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-tools-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-tools-devel-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:perf-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python2-perf-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python2-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python3-perf-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python3-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:bpftool-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:bpftool-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-debugsource-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-devel-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-source-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-tools-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-tools-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-tools-devel-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:perf-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python2-perf-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python2-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python3-perf-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python3-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-4.19.90-2409.1.0.0293.oe2003sp4.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2109"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":6.6,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L",
						"version":"3.1"
					},
					"products":[
						"openEuler-20.03-LTS-SP4:bpftool-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:bpftool-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-debugsource-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-devel-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-source-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-tools-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-tools-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-tools-devel-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:perf-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python2-perf-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python2-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python3-perf-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python3-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:bpftool-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:bpftool-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-debugsource-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-devel-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-source-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-tools-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-tools-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-tools-devel-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:perf-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python2-perf-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python2-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python3-perf-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python3-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-4.19.90-2409.1.0.0293.oe2003sp4.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-40901"
		},
		{
			"cve":"CVE-2024-42131",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nmm: avoid overflows in dirty throttling logic\n\nThe dirty throttling logic is interspersed with assumptions that dirty\nlimits in PAGE_SIZE units fit into 32-bit (so that various multiplications\nfit into 64-bits).  If limits end up being larger, we will hit overflows,\npossible divisions by 0 etc.  Fix these problems by never allowing so\nlarge dirty limits as they have dubious practical value anyway.  For\ndirty_bytes / dirty_background_bytes interfaces we can just refuse to set\nso large limits.  For dirty_ratio / dirty_background_ratio it isn't so\nsimple as the dirty limit is computed from the amount of available memory\nwhich can change due to memory hotplug etc.  So when converting dirty\nlimits from ratios to numbers of pages, we just don't allow the result to\nexceed UINT_MAX.\n\nThis is root-only triggerable problem which occurs when the operator\nsets dirty limits to >16 TB.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-20.03-LTS-SP4:bpftool-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:bpftool-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-debugsource-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-devel-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-source-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-tools-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-tools-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-tools-devel-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:perf-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:python2-perf-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:python2-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:python3-perf-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:python3-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:bpftool-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:bpftool-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-debugsource-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-devel-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-source-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-tools-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-tools-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-tools-devel-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:perf-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:python2-perf-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:python2-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:python3-perf-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:python3-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-4.19.90-2409.1.0.0293.oe2003sp4.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-20.03-LTS-SP4:bpftool-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:bpftool-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-debugsource-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-devel-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-source-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-tools-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-tools-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-tools-devel-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:perf-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python2-perf-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python2-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python3-perf-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python3-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:bpftool-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:bpftool-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-debugsource-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-devel-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-source-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-tools-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-tools-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-tools-devel-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:perf-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python2-perf-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python2-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python3-perf-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python3-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-4.19.90-2409.1.0.0293.oe2003sp4.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2109"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-20.03-LTS-SP4:bpftool-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:bpftool-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-debugsource-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-devel-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-source-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-tools-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-tools-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-tools-devel-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:perf-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python2-perf-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python2-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python3-perf-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python3-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:bpftool-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:bpftool-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-debugsource-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-devel-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-source-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-tools-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-tools-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-tools-devel-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:perf-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python2-perf-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python2-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python3-perf-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python3-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-4.19.90-2409.1.0.0293.oe2003sp4.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-42131"
		},
		{
			"cve":"CVE-2024-42286",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: qla2xxx: validate nvme_local_port correctly\n\nThe driver load failed with error message,\n\nqla2xxx [0000:04:00.0]-ffff:0: register_localport failed: ret=ffffffef\n\nand with a kernel crash,\n\n\tBUG: unable to handle kernel NULL pointer dereference at 0000000000000070\n\tWorkqueue: events_unbound qla_register_fcport_fn [qla2xxx]\n\tRIP: 0010:nvme_fc_register_remoteport+0x16/0x430 [nvme_fc]\n\tRSP: 0018:ffffaaa040eb3d98 EFLAGS: 00010282\n\tRAX: 0000000000000000 RBX: ffff9dfb46b78c00 RCX: 0000000000000000\n\tRDX: ffff9dfb46b78da8 RSI: ffffaaa040eb3e08 RDI: 0000000000000000\n\tRBP: ffff9dfb612a0a58 R08: ffffffffaf1d6270 R09: 3a34303a30303030\n\tR10: 34303a303030305b R11: 2078787832616c71 R12: ffff9dfb46b78dd4\n\tR13: ffff9dfb46b78c24 R14: ffff9dfb41525300 R15: ffff9dfb46b78da8\n\tFS:  0000000000000000(0000) GS:ffff9dfc67c00000(0000) knlGS:0000000000000000\n\tCS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n\tCR2: 0000000000000070 CR3: 000000018da10004 CR4: 00000000000206f0\n\tCall Trace:\n\tqla_nvme_register_remote+0xeb/0x1f0 [qla2xxx]\n\t? qla2x00_dfs_create_rport+0x231/0x270 [qla2xxx]\n\tqla2x00_update_fcport+0x2a1/0x3c0 [qla2xxx]\n\tqla_register_fcport_fn+0x54/0xc0 [qla2xxx]\n\nExit the qla_nvme_register_remote() function when qla_nvme_register_hba()\nfails and correctly validate nvme_local_port.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-20.03-LTS-SP4:bpftool-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:bpftool-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-debugsource-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-devel-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-source-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-tools-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-tools-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-tools-devel-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:perf-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:python2-perf-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:python2-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:python3-perf-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:python3-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:bpftool-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:bpftool-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-debugsource-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-devel-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-source-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-tools-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-tools-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-tools-devel-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:perf-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:python2-perf-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:python2-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:python3-perf-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:python3-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-4.19.90-2409.1.0.0293.oe2003sp4.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-20.03-LTS-SP4:bpftool-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:bpftool-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-debugsource-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-devel-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-source-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-tools-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-tools-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-tools-devel-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:perf-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python2-perf-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python2-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python3-perf-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python3-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:bpftool-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:bpftool-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-debugsource-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-devel-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-source-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-tools-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-tools-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-tools-devel-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:perf-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python2-perf-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python2-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python3-perf-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python3-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-4.19.90-2409.1.0.0293.oe2003sp4.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2109"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-20.03-LTS-SP4:bpftool-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:bpftool-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-debugsource-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-devel-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-source-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-tools-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-tools-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-tools-devel-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:perf-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python2-perf-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python2-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python3-perf-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python3-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:bpftool-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:bpftool-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-debugsource-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-devel-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-source-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-tools-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-tools-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-tools-devel-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:perf-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python2-perf-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python2-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python3-perf-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python3-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-4.19.90-2409.1.0.0293.oe2003sp4.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-42286"
		},
		{
			"cve":"CVE-2024-42292",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nkobject_uevent: Fix OOB access within zap_modalias_env()\n\nzap_modalias_env() wrongly calculates size of memory block to move, so\nwill cause OOB memory access issue if variable MODALIAS is not the last\none within its @env parameter, fixed by correcting size to memmove.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-20.03-LTS-SP4:bpftool-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:bpftool-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-debugsource-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-devel-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-source-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-tools-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-tools-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-tools-devel-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:perf-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:python2-perf-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:python2-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:python3-perf-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:python3-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:bpftool-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:bpftool-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-debugsource-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-devel-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-source-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-tools-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-tools-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-tools-devel-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:perf-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:python2-perf-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:python2-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:python3-perf-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:python3-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-4.19.90-2409.1.0.0293.oe2003sp4.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-20.03-LTS-SP4:bpftool-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:bpftool-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-debugsource-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-devel-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-source-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-tools-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-tools-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-tools-devel-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:perf-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python2-perf-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python2-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python3-perf-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python3-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:bpftool-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:bpftool-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-debugsource-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-devel-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-source-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-tools-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-tools-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-tools-devel-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:perf-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python2-perf-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python2-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python3-perf-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python3-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-4.19.90-2409.1.0.0293.oe2003sp4.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2109"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-20.03-LTS-SP4:bpftool-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:bpftool-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-debugsource-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-devel-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-source-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-tools-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-tools-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-tools-devel-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:perf-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python2-perf-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python2-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python3-perf-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python3-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:bpftool-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:bpftool-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-debugsource-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-devel-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-source-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-tools-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-tools-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-tools-devel-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:perf-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python2-perf-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python2-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python3-perf-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python3-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-4.19.90-2409.1.0.0293.oe2003sp4.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-42292"
		},
		{
			"cve":"CVE-2024-42311",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nhfs: fix to initialize fields of hfs_inode_info after hfs_alloc_inode()\n\nSyzbot reports uninitialized value access issue as below:\n\nloop0: detected capacity change from 0 to 64\n=====================================================\nBUG: KMSAN: uninit-value in hfs_revalidate_dentry+0x307/0x3f0 fs/hfs/sysdep.c:30\n hfs_revalidate_dentry+0x307/0x3f0 fs/hfs/sysdep.c:30\n d_revalidate fs/namei.c:862 [inline]\n lookup_fast+0x89e/0x8e0 fs/namei.c:1649\n walk_component fs/namei.c:2001 [inline]\n link_path_walk+0x817/0x1480 fs/namei.c:2332\n path_lookupat+0xd9/0x6f0 fs/namei.c:2485\n filename_lookup+0x22e/0x740 fs/namei.c:2515\n user_path_at_empty+0x8b/0x390 fs/namei.c:2924\n user_path_at include/linux/namei.h:57 [inline]\n do_mount fs/namespace.c:3689 [inline]\n __do_sys_mount fs/namespace.c:3898 [inline]\n __se_sys_mount+0x66b/0x810 fs/namespace.c:3875\n __x64_sys_mount+0xe4/0x140 fs/namespace.c:3875\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0xcf/0x1e0 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x63/0x6b\n\nBUG: KMSAN: uninit-value in hfs_ext_read_extent fs/hfs/extent.c:196 [inline]\nBUG: KMSAN: uninit-value in hfs_get_block+0x92d/0x1620 fs/hfs/extent.c:366\n hfs_ext_read_extent fs/hfs/extent.c:196 [inline]\n hfs_get_block+0x92d/0x1620 fs/hfs/extent.c:366\n block_read_full_folio+0x4ff/0x11b0 fs/buffer.c:2271\n hfs_read_folio+0x55/0x60 fs/hfs/inode.c:39\n filemap_read_folio+0x148/0x4f0 mm/filemap.c:2426\n do_read_cache_folio+0x7c8/0xd90 mm/filemap.c:3553\n do_read_cache_page mm/filemap.c:3595 [inline]\n read_cache_page+0xfb/0x2f0 mm/filemap.c:3604\n read_mapping_page include/linux/pagemap.h:755 [inline]\n hfs_btree_open+0x928/0x1ae0 fs/hfs/btree.c:78\n hfs_mdb_get+0x260c/0x3000 fs/hfs/mdb.c:204\n hfs_fill_super+0x1fb1/0x2790 fs/hfs/super.c:406\n mount_bdev+0x628/0x920 fs/super.c:1359\n hfs_mount+0xcd/0xe0 fs/hfs/super.c:456\n legacy_get_tree+0x167/0x2e0 fs/fs_context.c:610\n vfs_get_tree+0xdc/0x5d0 fs/super.c:1489\n do_new_mount+0x7a9/0x16f0 fs/namespace.c:3145\n path_mount+0xf98/0x26a0 fs/namespace.c:3475\n do_mount fs/namespace.c:3488 [inline]\n __do_sys_mount fs/namespace.c:3697 [inline]\n __se_sys_mount+0x919/0x9e0 fs/namespace.c:3674\n __ia32_sys_mount+0x15b/0x1b0 fs/namespace.c:3674\n do_syscall_32_irqs_on arch/x86/entry/common.c:112 [inline]\n __do_fast_syscall_32+0xa2/0x100 arch/x86/entry/common.c:178\n do_fast_syscall_32+0x37/0x80 arch/x86/entry/common.c:203\n do_SYSENTER_32+0x1f/0x30 arch/x86/entry/common.c:246\n entry_SYSENTER_compat_after_hwframe+0x70/0x82\n\nUninit was created at:\n __alloc_pages+0x9a6/0xe00 mm/page_alloc.c:4590\n __alloc_pages_node include/linux/gfp.h:238 [inline]\n alloc_pages_node include/linux/gfp.h:261 [inline]\n alloc_slab_page mm/slub.c:2190 [inline]\n allocate_slab mm/slub.c:2354 [inline]\n new_slab+0x2d7/0x1400 mm/slub.c:2407\n ___slab_alloc+0x16b5/0x3970 mm/slub.c:3540\n __slab_alloc mm/slub.c:3625 [inline]\n __slab_alloc_node mm/slub.c:3678 [inline]\n slab_alloc_node mm/slub.c:3850 [inline]\n kmem_cache_alloc_lru+0x64d/0xb30 mm/slub.c:3879\n alloc_inode_sb include/linux/fs.h:3018 [inline]\n hfs_alloc_inode+0x5a/0xc0 fs/hfs/super.c:165\n alloc_inode+0x83/0x440 fs/inode.c:260\n new_inode_pseudo fs/inode.c:1005 [inline]\n new_inode+0x38/0x4f0 fs/inode.c:1031\n hfs_new_inode+0x61/0x1010 fs/hfs/inode.c:186\n hfs_mkdir+0x54/0x250 fs/hfs/dir.c:228\n vfs_mkdir+0x49a/0x700 fs/namei.c:4126\n do_mkdirat+0x529/0x810 fs/namei.c:4149\n __do_sys_mkdirat fs/namei.c:4164 [inline]\n __se_sys_mkdirat fs/namei.c:4162 [inline]\n __x64_sys_mkdirat+0xc8/0x120 fs/namei.c:4162\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0xcf/0x1e0 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x63/0x6b\n\nIt missed to initialize .tz_secondswest, .cached_start and .cached_blocks\nfields in struct hfs_inode_info after hfs_alloc_inode(), fix it.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-20.03-LTS-SP4:bpftool-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:bpftool-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-debugsource-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-devel-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-source-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-tools-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-tools-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-tools-devel-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:perf-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:python2-perf-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:python2-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:python3-perf-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:python3-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:bpftool-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:bpftool-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-debugsource-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-devel-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-source-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-tools-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-tools-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-tools-devel-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:perf-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:python2-perf-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:python2-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:python3-perf-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:python3-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-4.19.90-2409.1.0.0293.oe2003sp4.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-20.03-LTS-SP4:bpftool-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:bpftool-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-debugsource-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-devel-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-source-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-tools-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-tools-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-tools-devel-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:perf-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python2-perf-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python2-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python3-perf-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python3-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:bpftool-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:bpftool-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-debugsource-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-devel-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-source-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-tools-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-tools-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-tools-devel-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:perf-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python2-perf-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python2-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python3-perf-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python3-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-4.19.90-2409.1.0.0293.oe2003sp4.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2109"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-20.03-LTS-SP4:bpftool-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:bpftool-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-debugsource-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-devel-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-source-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-tools-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-tools-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-tools-devel-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:perf-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python2-perf-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python2-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python3-perf-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python3-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:bpftool-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:bpftool-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-debugsource-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-devel-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-source-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-tools-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-tools-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-tools-devel-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:perf-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python2-perf-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python2-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python3-perf-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python3-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-4.19.90-2409.1.0.0293.oe2003sp4.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-42311"
		},
		{
			"cve":"CVE-2024-42312",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nsysctl: always initialize i_uid/i_gid\n\nAlways initialize i_uid/i_gid inside the sysfs core so set_ownership()\ncan safely skip setting them.\n\nCommit 5ec27ec735ba (\"fs/proc/proc_sysctl.c: fix the default values of\ni_uid/i_gid on /proc/sys inodes.\") added defaults for i_uid/i_gid when\nset_ownership() was not implemented. It also missed adjusting\nnet_ctl_set_ownership() to use the same default values in case the\ncomputation of a better value failed.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-20.03-LTS-SP4:bpftool-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:bpftool-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-debugsource-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-devel-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-source-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-tools-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-tools-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-tools-devel-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:perf-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:python2-perf-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:python2-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:python3-perf-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:python3-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:bpftool-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:bpftool-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-debugsource-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-devel-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-source-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-tools-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-tools-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-tools-devel-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:perf-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:python2-perf-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:python2-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:python3-perf-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:python3-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-4.19.90-2409.1.0.0293.oe2003sp4.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-20.03-LTS-SP4:bpftool-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:bpftool-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-debugsource-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-devel-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-source-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-tools-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-tools-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-tools-devel-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:perf-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python2-perf-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python2-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python3-perf-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python3-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:bpftool-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:bpftool-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-debugsource-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-devel-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-source-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-tools-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-tools-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-tools-devel-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:perf-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python2-perf-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python2-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python3-perf-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python3-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-4.19.90-2409.1.0.0293.oe2003sp4.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2109"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-20.03-LTS-SP4:bpftool-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:bpftool-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-debugsource-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-devel-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-source-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-tools-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-tools-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-tools-devel-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:perf-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python2-perf-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python2-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python3-perf-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python3-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:bpftool-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:bpftool-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-debugsource-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-devel-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-source-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-tools-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-tools-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-tools-devel-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:perf-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python2-perf-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python2-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python3-perf-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python3-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-4.19.90-2409.1.0.0293.oe2003sp4.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-42312"
		},
		{
			"cve":"CVE-2024-43883",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nusb: vhci-hcd: Do not drop references before new references are gained\n\nAt a few places the driver carries stale pointers\nto references that can still be used. Make sure that does not happen.\nThis strictly speaking closes ZDI-CAN-22273, though there may be\nsimilar races in the driver.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-20.03-LTS-SP4:bpftool-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:bpftool-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-debugsource-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-devel-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-source-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-tools-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-tools-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-tools-devel-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:perf-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:python2-perf-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:python2-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:python3-perf-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:python3-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:bpftool-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:bpftool-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-debugsource-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-devel-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-source-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-tools-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-tools-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-tools-devel-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:perf-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:python2-perf-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:python2-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:python3-perf-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:python3-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-4.19.90-2409.1.0.0293.oe2003sp4.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-20.03-LTS-SP4:bpftool-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:bpftool-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-debugsource-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-devel-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-source-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-tools-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-tools-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-tools-devel-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:perf-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python2-perf-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python2-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python3-perf-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python3-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:bpftool-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:bpftool-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-debugsource-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-devel-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-source-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-tools-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-tools-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-tools-devel-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:perf-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python2-perf-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python2-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python3-perf-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python3-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-4.19.90-2409.1.0.0293.oe2003sp4.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2109"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-20.03-LTS-SP4:bpftool-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:bpftool-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-debugsource-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-devel-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-source-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-tools-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-tools-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-tools-devel-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:perf-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python2-perf-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python2-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python3-perf-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python3-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:bpftool-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:bpftool-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-debugsource-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-devel-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-source-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-tools-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-tools-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-tools-devel-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:perf-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python2-perf-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python2-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python3-perf-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python3-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-4.19.90-2409.1.0.0293.oe2003sp4.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-43883"
		},
		{
			"cve":"CVE-2024-43890",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\ntracing: Fix overflow in get_free_elt()\n\n\"tracing_map->next_elt\" in get_free_elt() is at risk of overflowing.\n\nOnce it overflows, new elements can still be inserted into the tracing_map\neven though the maximum number of elements (`max_elts`) has been reached.\nContinuing to insert elements after the overflow could result in the\ntracing_map containing \"tracing_map->max_size\" elements, leaving no empty\nentries.\nIf any attempt is made to insert an element into a full tracing_map using\n`__tracing_map_insert()`, it will cause an infinite loop with preemption\ndisabled, leading to a CPU hang problem.\n\nFix this by preventing any further increments to \"tracing_map->next_elt\"\nonce it reaches \"tracing_map->max_elt\".",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-20.03-LTS-SP4:bpftool-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:bpftool-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-debugsource-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-devel-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-source-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-tools-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-tools-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-tools-devel-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:perf-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:python2-perf-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:python2-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:python3-perf-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:python3-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:bpftool-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:bpftool-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-debugsource-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-devel-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-source-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-tools-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-tools-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-tools-devel-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:perf-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:python2-perf-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:python2-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:python3-perf-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:python3-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-4.19.90-2409.1.0.0293.oe2003sp4.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-20.03-LTS-SP4:bpftool-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:bpftool-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-debugsource-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-devel-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-source-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-tools-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-tools-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-tools-devel-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:perf-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python2-perf-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python2-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python3-perf-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python3-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:bpftool-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:bpftool-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-debugsource-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-devel-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-source-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-tools-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-tools-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-tools-devel-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:perf-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python2-perf-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python2-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python3-perf-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python3-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-4.19.90-2409.1.0.0293.oe2003sp4.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2109"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-20.03-LTS-SP4:bpftool-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:bpftool-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-debugsource-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-devel-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-source-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-tools-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-tools-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-tools-devel-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:perf-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python2-perf-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python2-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python3-perf-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python3-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:bpftool-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:bpftool-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-debugsource-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-devel-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-source-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-tools-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-tools-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-tools-devel-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:perf-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python2-perf-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python2-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python3-perf-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python3-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-4.19.90-2409.1.0.0293.oe2003sp4.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-43890"
		},
		{
			"cve":"CVE-2024-43900",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: xc2028: avoid use-after-free in load_firmware_cb()\n\nsyzkaller reported use-after-free in load_firmware_cb() [1].\nThe reason is because the module allocated a struct tuner in tuner_probe(),\nand then the module initialization failed, the struct tuner was released.\nA worker which created during module initialization accesses this struct\ntuner later, it caused use-after-free.\n\nThe process is as follows:\n\ntask-6504           worker_thread\ntuner_probe                             <= alloc dvb_frontend [2]\n...\nrequest_firmware_nowait                 <= create a worker\n...\ntuner_remove                            <= free dvb_frontend\n...\n                    request_firmware_work_func  <= the firmware is ready\n                    load_firmware_cb    <= but now the dvb_frontend has been freed\n\nTo fix the issue, check the dvd_frontend in load_firmware_cb(), if it is\nnull, report a warning and just return.\n\n[1]:\n    ==================================================================\n     BUG: KASAN: use-after-free in load_firmware_cb+0x1310/0x17a0\n     Read of size 8 at addr ffff8000d7ca2308 by task kworker/2:3/6504\n\n     Call trace:\n      load_firmware_cb+0x1310/0x17a0\n      request_firmware_work_func+0x128/0x220\n      process_one_work+0x770/0x1824\n      worker_thread+0x488/0xea0\n      kthread+0x300/0x430\n      ret_from_fork+0x10/0x20\n\n     Allocated by task 6504:\n      kzalloc\n      tuner_probe+0xb0/0x1430\n      i2c_device_probe+0x92c/0xaf0\n      really_probe+0x678/0xcd0\n      driver_probe_device+0x280/0x370\n      __device_attach_driver+0x220/0x330\n      bus_for_each_drv+0x134/0x1c0\n      __device_attach+0x1f4/0x410\n      device_initial_probe+0x20/0x30\n      bus_probe_device+0x184/0x200\n      device_add+0x924/0x12c0\n      device_register+0x24/0x30\n      i2c_new_device+0x4e0/0xc44\n      v4l2_i2c_new_subdev_board+0xbc/0x290\n      v4l2_i2c_new_subdev+0xc8/0x104\n      em28xx_v4l2_init+0x1dd0/0x3770\n\n     Freed by task 6504:\n      kfree+0x238/0x4e4\n      tuner_remove+0x144/0x1c0\n      i2c_device_remove+0xc8/0x290\n      __device_release_driver+0x314/0x5fc\n      device_release_driver+0x30/0x44\n      bus_remove_device+0x244/0x490\n      device_del+0x350/0x900\n      device_unregister+0x28/0xd0\n      i2c_unregister_device+0x174/0x1d0\n      v4l2_device_unregister+0x224/0x380\n      em28xx_v4l2_init+0x1d90/0x3770\n\n     The buggy address belongs to the object at ffff8000d7ca2000\n      which belongs to the cache kmalloc-2k of size 2048\n     The buggy address is located 776 bytes inside of\n      2048-byte region [ffff8000d7ca2000, ffff8000d7ca2800)\n     The buggy address belongs to the page:\n     page:ffff7fe00035f280 count:1 mapcount:0 mapping:ffff8000c001f000 index:0x0\n     flags: 0x7ff800000000100(slab)\n     raw: 07ff800000000100 ffff7fe00049d880 0000000300000003 ffff8000c001f000\n     raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000\n     page dumped because: kasan: bad access detected\n\n     Memory state around the buggy address:\n      ffff8000d7ca2200: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb\n      ffff8000d7ca2280: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb\n     >ffff8000d7ca2300: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb\n                           ^\n      ffff8000d7ca2380: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb\n      ffff8000d7ca2400: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb\n     ==================================================================\n\n[2]\n    Actually, it is allocated for struct tuner, and dvb_frontend is inside.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-20.03-LTS-SP4:bpftool-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:bpftool-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-debugsource-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-devel-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-source-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-tools-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-tools-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-tools-devel-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:perf-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:python2-perf-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:python2-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:python3-perf-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:python3-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:bpftool-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:bpftool-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-debugsource-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-devel-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-source-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-tools-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-tools-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-tools-devel-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:perf-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:python2-perf-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:python2-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:python3-perf-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:python3-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-4.19.90-2409.1.0.0293.oe2003sp4.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-20.03-LTS-SP4:bpftool-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:bpftool-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-debugsource-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-devel-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-source-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-tools-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-tools-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-tools-devel-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:perf-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python2-perf-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python2-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python3-perf-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python3-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:bpftool-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:bpftool-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-debugsource-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-devel-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-source-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-tools-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-tools-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-tools-devel-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:perf-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python2-perf-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python2-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python3-perf-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python3-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-4.19.90-2409.1.0.0293.oe2003sp4.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2109"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.8,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-20.03-LTS-SP4:bpftool-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:bpftool-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-debugsource-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-devel-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-source-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-tools-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-tools-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-tools-devel-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:perf-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python2-perf-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python2-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python3-perf-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python3-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:bpftool-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:bpftool-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-debugsource-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-devel-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-source-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-tools-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-tools-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-tools-devel-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:perf-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python2-perf-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python2-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python3-perf-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python3-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-4.19.90-2409.1.0.0293.oe2003sp4.src"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2024-43900"
		},
		{
			"cve":"CVE-2024-44944",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: ctnetlink: use helper function to calculate expect ID\n\nDelete expectation path is missing a call to the nf_expect_get_id()\nhelper function to calculate the expectation ID, otherwise LSB of the\nexpectation object address is leaked to userspace.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-20.03-LTS-SP4:bpftool-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:bpftool-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-debugsource-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-devel-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-source-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-tools-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-tools-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-tools-devel-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:perf-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:python2-perf-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:python2-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:python3-perf-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:python3-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:bpftool-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:bpftool-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-debugsource-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-devel-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-source-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-tools-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-tools-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-tools-devel-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:perf-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:python2-perf-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:python2-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:python3-perf-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:python3-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-4.19.90-2409.1.0.0293.oe2003sp4.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-20.03-LTS-SP4:bpftool-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:bpftool-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-debugsource-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-devel-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-source-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-tools-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-tools-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-tools-devel-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:perf-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python2-perf-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python2-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python3-perf-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python3-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:bpftool-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:bpftool-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-debugsource-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-devel-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-source-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-tools-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-tools-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-tools-devel-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:perf-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python2-perf-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python2-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python3-perf-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python3-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-4.19.90-2409.1.0.0293.oe2003sp4.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2109"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-20.03-LTS-SP4:bpftool-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:bpftool-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-debugsource-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-devel-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-source-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-tools-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-tools-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-tools-devel-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:perf-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python2-perf-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python2-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python3-perf-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python3-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:bpftool-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:bpftool-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-debugsource-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-devel-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-source-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-tools-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-tools-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-tools-devel-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:perf-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python2-perf-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python2-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python3-perf-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python3-perf-debuginfo-4.19.90-2409.1.0.0293.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-4.19.90-2409.1.0.0293.oe2003sp4.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-44944"
		}
	]
}