{
	"document":{
		"aggregate_severity":{
			"namespace":"https://nvd.nist.gov/vuln-metrics/cvss",
			"text":"High"
		},
		"category":"csaf_vex",
		"csaf_version":"2.0",
		"distribution":{
			"tlp":{
				"label":"WHITE",
				"url":"https:/www.first.org/tlp/"
			}
		},
		"lang":"en",
		"notes":[
			{
				"text":"kernel security update",
				"category":"general",
				"title":"Synopsis"
			},
			{
				"text":"An update for kernel is now available for openEuler-24.03-LTS",
				"category":"general",
				"title":"Summary"
			},
			{
				"text":"The Linux Kernel, the operating system core itself.\n\nSecurity Fix(es):\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\ntcp: Use refcount_inc_not_zero() in tcp_twsk_unique().\n\nAnderson Nascimento reported a use-after-free splat in tcp_twsk_unique()\nwith nice analysis.\n\nSince commit ec94c2696f0b (\"tcp/dccp: avoid one atomic operation for\ntimewait hashdance\"), inet_twsk_hashdance() sets TIME-WAIT socket's\nsk_refcnt after putting it into ehash and releasing the bucket lock.\n\nThus, there is a small race window where other threads could try to\nreuse the port during connect() and call sock_hold() in tcp_twsk_unique()\nfor the TIME-WAIT socket with zero refcnt.\n\nIf that happens, the refcnt taken by tcp_twsk_unique() is overwritten\nand sock_put() will cause underflow, triggering a real use-after-free\nsomewhere else.\n\nTo avoid the use-after-free, we need to use refcount_inc_not_zero() in\ntcp_twsk_unique() and give up on reusing the port if it returns false.\n\n[0]:\nrefcount_t: addition on 0; use-after-free.\nWARNING: CPU: 0 PID: 1039313 at lib/refcount.c:25 refcount_warn_saturate+0xe5/0x110\nCPU: 0 PID: 1039313 Comm: trigger Not tainted 6.8.6-200.fc39.x86_64 #1\nHardware name: VMware, Inc. VMware20,1/440BX Desktop Reference Platform, BIOS VMW201.00V.21805430.B64.2305221830 05/22/2023\nRIP: 0010:refcount_warn_saturate+0xe5/0x110\nCode: 42 8e ff 0f 0b c3 cc cc cc cc 80 3d aa 13 ea 01 00 0f 85 5e ff ff ff 48 c7 c7 f8 8e b7 82 c6 05 96 13 ea 01 01 e8 7b 42 8e ff <0f> 0b c3 cc cc cc cc 48 c7 c7 50 8f b7 82 c6 05 7a 13 ea 01 01 e8\nRSP: 0018:ffffc90006b43b60 EFLAGS: 00010282\nRAX: 0000000000000000 RBX: ffff888009bb3ef0 RCX: 0000000000000027\nRDX: ffff88807be218c8 RSI: 0000000000000001 RDI: ffff88807be218c0\nRBP: 0000000000069d70 R08: 0000000000000000 R09: ffffc90006b439f0\nR10: ffffc90006b439e8 R11: 0000000000000003 R12: ffff8880029ede84\nR13: 0000000000004e20 R14: ffffffff84356dc0 R15: ffff888009bb3ef0\nFS:  00007f62c10926c0(0000) GS:ffff88807be00000(0000) knlGS:0000000000000000\nCS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000000020ccb000 CR3: 000000004628c005 CR4: 0000000000f70ef0\nPKRU: 55555554\nCall Trace:\n <TASK>\n ? refcount_warn_saturate+0xe5/0x110\n ? __warn+0x81/0x130\n ? refcount_warn_saturate+0xe5/0x110\n ? report_bug+0x171/0x1a0\n ? refcount_warn_saturate+0xe5/0x110\n ? handle_bug+0x3c/0x80\n ? exc_invalid_op+0x17/0x70\n ? asm_exc_invalid_op+0x1a/0x20\n ? refcount_warn_saturate+0xe5/0x110\n tcp_twsk_unique+0x186/0x190\n __inet_check_established+0x176/0x2d0\n __inet_hash_connect+0x74/0x7d0\n ? __pfx___inet_check_established+0x10/0x10\n tcp_v4_connect+0x278/0x530\n __inet_stream_connect+0x10f/0x3d0\n inet_stream_connect+0x3a/0x60\n __sys_connect+0xa8/0xd0\n __x64_sys_connect+0x18/0x20\n do_syscall_64+0x83/0x170\n entry_SYSCALL_64_after_hwframe+0x78/0x80\nRIP: 0033:0x7f62c11a885d\nCode: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d a3 45 0c 00 f7 d8 64 89 01 48\nRSP: 002b:00007f62c1091e58 EFLAGS: 00000296 ORIG_RAX: 000000000000002a\nRAX: ffffffffffffffda RBX: 0000000020ccb004 RCX: 00007f62c11a885d\nRDX: 0000000000000010 RSI: 0000000020ccb000 RDI: 0000000000000003\nRBP: 00007f62c1091e90 R08: 0000000000000000 R09: 0000000000000000\nR10: 0000000000000000 R11: 0000000000000296 R12: 00007f62c10926c0\nR13: ffffffffffffff88 R14: 0000000000000000 R15: 00007ffe237885b0\n </TASK>(CVE-2024-36904)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amdgpu: change vm->task_info handling\n\nThis patch changes the handling and lifecycle of vm->task_info object.\nThe major changes are:\n- vm->task_info is a dynamically allocated ptr now, and its uasge is\n  reference counted.\n- introducing two new helper funcs for task_info lifecycle management\n    - amdgpu_vm_get_task_info: reference counts up task_info before\n      returning this info\n    - amdgpu_vm_put_task_info: reference counts down task_info\n- last put to task_info() frees task_info from the vm.\n\nThis patch also does logistical changes required for existing usage\nof vm->task_info.\n\nV2: Do not block all the prints when task_info not found (Felix)\n\nV3: Fixed review comments from Felix\n   - Fix wrong indentation\n   - No debug message for -ENOMEM\n   - Add NULL check for task_info\n   - Do not duplicate the debug messages (ti vs no ti)\n   - Get first reference of task_info in vm_init(), put last\n     in vm_fini()\n\nV4: Fixed review comments from Felix\n   - fix double reference increment in create_task_info\n   - change amdgpu_vm_get_task_info_pasid\n   - additional changes in amdgpu_gem.c while porting(CVE-2024-41008)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Add null checks for 'stream' and 'plane' before dereferencing\n\nThis commit adds null checks for the 'stream' and 'plane' variables in\nthe dcn30_apply_idle_power_optimizations function. These variables were\npreviously assumed to be null at line 922, but they were used later in\nthe code without checking if they were null. This could potentially lead\nto a null pointer dereference, which would cause a crash.\n\nThe null checks ensure that 'stream' and 'plane' are not null before\nthey are used, preventing potential crashes.\n\nFixes the below static smatch checker:\ndrivers/gpu/drm/amd/amdgpu/../display/dc/hwss/dcn30/dcn30_hwseq.c:938 dcn30_apply_idle_power_optimizations() error: we previously assumed 'stream' could be null (see line 922)\ndrivers/gpu/drm/amd/amdgpu/../display/dc/hwss/dcn30/dcn30_hwseq.c:940 dcn30_apply_idle_power_optimizations() error: we previously assumed 'plane' could be null (see line 922)(CVE-2024-43904)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nALSA: line6: Fix racy access to midibuf\n\nThere can be concurrent accesses to line6 midibuf from both the URB\ncompletion callback and the rawmidi API access.  This could be a cause\nof KMSAN warning triggered by syzkaller below (so put as reported-by\nhere).\n\nThis patch protects the midibuf call of the former code path with a\nspinlock for avoiding the possible races.(CVE-2024-44954)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\ntracefs: Use generic inode RCU for synchronizing freeing\n\nWith structure layout randomization enabled for 'struct inode' we need to\navoid overlapping any of the RCU-used / initialized-only-once members,\ne.g. i_lru or i_sb_list to not corrupt related list traversals when making\nuse of the rcu_head.\n\nFor an unlucky structure layout of 'struct inode' we may end up with the\nfollowing splat when running the ftrace selftests:\n\n[<...>] list_del corruption, ffff888103ee2cb0->next (tracefs_inode_cache+0x0/0x4e0 [slab object]) is NULL (prev is tracefs_inode_cache+0x78/0x4e0 [slab object])\n[<...>] ------------[ cut here ]------------\n[<...>] kernel BUG at lib/list_debug.c:54!\n[<...>] invalid opcode: 0000 [#1] PREEMPT SMP KASAN\n[<...>] CPU: 3 PID: 2550 Comm: mount Tainted: G                 N  6.8.12-grsec+ #122 ed2f536ca62f28b087b90e3cc906a8d25b3ddc65\n[<...>] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.14.0-2 04/01/2014\n[<...>] RIP: 0010:[<ffffffff84656018>] __list_del_entry_valid_or_report+0x138/0x3e0\n[<...>] Code: 48 b8 99 fb 65 f2 ff ff ff ff e9 03 5c d9 fc cc 48 b8 99 fb 65 f2 ff ff ff ff e9 33 5a d9 fc cc 48 b8 99 fb 65 f2 ff ff ff ff <0f> 0b 4c 89 e9 48 89 ea 48 89 ee 48 c7 c7 60 8f dd 89 31 c0 e8 2f\n[<...>] RSP: 0018:fffffe80416afaf0 EFLAGS: 00010283\n[<...>] RAX: 0000000000000098 RBX: ffff888103ee2cb0 RCX: 0000000000000000\n[<...>] RDX: ffffffff84655fe8 RSI: ffffffff89dd8b60 RDI: 0000000000000001\n[<...>] RBP: ffff888103ee2cb0 R08: 0000000000000001 R09: fffffbd0082d5f25\n[<...>] R10: fffffe80416af92f R11: 0000000000000001 R12: fdf99c16731d9b6d\n[<...>] R13: 0000000000000000 R14: ffff88819ad4b8b8 R15: 0000000000000000\n[<...>] RBX: tracefs_inode_cache+0x0/0x4e0 [slab object]\n[<...>] RDX: __list_del_entry_valid_or_report+0x108/0x3e0\n[<...>] RSI: __func__.47+0x4340/0x4400\n[<...>] RBP: tracefs_inode_cache+0x0/0x4e0 [slab object]\n[<...>] RSP: process kstack fffffe80416afaf0+0x7af0/0x8000 [mount 2550 2550]\n[<...>] R09: kasan shadow of process kstack fffffe80416af928+0x7928/0x8000 [mount 2550 2550]\n[<...>] R10: process kstack fffffe80416af92f+0x792f/0x8000 [mount 2550 2550]\n[<...>] R14: tracefs_inode_cache+0x78/0x4e0 [slab object]\n[<...>] FS:  00006dcb380c1840(0000) GS:ffff8881e0600000(0000) knlGS:0000000000000000\n[<...>] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[<...>] CR2: 000076ab72b30e84 CR3: 000000000b088004 CR4: 0000000000360ef0 shadow CR4: 0000000000360ef0\n[<...>] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n[<...>] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n[<...>] ASID: 0003\n[<...>] Stack:\n[<...>]  ffffffff818a2315 00000000f5c856ee ffffffff896f1840 ffff888103ee2cb0\n[<...>]  ffff88812b6b9750 0000000079d714b6 fffffbfff1e9280b ffffffff8f49405f\n[<...>]  0000000000000001 0000000000000000 ffff888104457280 ffffffff8248b392\n[<...>] Call Trace:\n[<...>]  <TASK>\n[<...>]  [<ffffffff818a2315>] ? lock_release+0x175/0x380 fffffe80416afaf0\n[<...>]  [<ffffffff8248b392>] list_lru_del+0x152/0x740 fffffe80416afb48\n[<...>]  [<ffffffff8248ba93>] list_lru_del_obj+0x113/0x280 fffffe80416afb88\n[<...>]  [<ffffffff8940fd19>] ? _atomic_dec_and_lock+0x119/0x200 fffffe80416afb90\n[<...>]  [<ffffffff8295b244>] iput_final+0x1c4/0x9a0 fffffe80416afbb8\n[<...>]  [<ffffffff8293a52b>] dentry_unlink_inode+0x44b/0xaa0 fffffe80416afbf8\n[<...>]  [<ffffffff8293fefc>] __dentry_kill+0x23c/0xf00 fffffe80416afc40\n[<...>]  [<ffffffff8953a85f>] ? __this_cpu_preempt_check+0x1f/0xa0 fffffe80416afc48\n[<...>]  [<ffffffff82949ce5>] ? shrink_dentry_list+0x1c5/0x760 fffffe80416afc70\n[<...>]  [<ffffffff82949b71>] ? shrink_dentry_list+0x51/0x760 fffffe80416afc78\n[<...>]  [<ffffffff82949da8>] shrink_dentry_list+0x288/0x760 fffffe80416afc80\n[<...>]  [<ffffffff8294ae75>] shrink_dcache_sb+0x155/0x420 fffffe80416afcc8\n[<...>]  [<ffffffff8953a7c3>] ? debug_smp_processor_id+0x23/0xa0 fffffe80416afce0\n[<...>]  [<ffffffff8294ad20>] ? do_one_tre\n---truncated---(CVE-2024-44959)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: btnxpuart: Shutdown timer and prevent rearming when driver unloading\n\nWhen unload the btnxpuart driver, its associated timer will be deleted.\nIf the timer happens to be modified at this moment, it leads to the\nkernel call this timer even after the driver unloaded, resulting in\nkernel panic.\nUse timer_shutdown_sync() instead of del_timer_sync() to prevent rearming.\n\npanic log:\n  Internal error: Oops: 0000000086000007 [#1] PREEMPT SMP\n  Modules linked in: algif_hash algif_skcipher af_alg moal(O) mlan(O) crct10dif_ce polyval_ce polyval_generic   snd_soc_imx_card snd_soc_fsl_asoc_card snd_soc_imx_audmux mxc_jpeg_encdec v4l2_jpeg snd_soc_wm8962 snd_soc_fsl_micfil   snd_soc_fsl_sai flexcan snd_soc_fsl_utils ap130x rpmsg_ctrl imx_pcm_dma can_dev rpmsg_char pwm_fan fuse [last unloaded:   btnxpuart]\n  CPU: 5 PID: 723 Comm: memtester Tainted: G           O       6.6.23-lts-next-06207-g4aef2658ac28 #1\n  Hardware name: NXP i.MX95 19X19 board (DT)\n  pstate: 20400009 (nzCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n  pc : 0xffff80007a2cf464\n  lr : call_timer_fn.isra.0+0x24/0x80\n...\n  Call trace:\n   0xffff80007a2cf464\n   __run_timers+0x234/0x280\n   run_timer_softirq+0x20/0x40\n   __do_softirq+0x100/0x26c\n   ____do_softirq+0x10/0x1c\n   call_on_irq_stack+0x24/0x4c\n   do_softirq_own_stack+0x1c/0x2c\n   irq_exit_rcu+0xc0/0xdc\n   el0_interrupt+0x54/0xd8\n   __el0_irq_handler_common+0x18/0x24\n   el0t_64_irq_handler+0x10/0x1c\n   el0t_64_irq+0x190/0x194\n  Code: ???????? ???????? ???????? ???????? (????????)\n  ---[ end trace 0000000000000000 ]---\n  Kernel panic - not syncing: Oops: Fatal exception in interrupt\n  SMP: stopping secondary CPUs\n  Kernel Offset: disabled\n  CPU features: 0x0,c0000000,40028143,1000721b\n  Memory Limit: none\n  ---[ end Kernel panic - not syncing: Oops: Fatal exception in interrupt ]---(CVE-2024-44962)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nx86/mm: Fix pti_clone_pgtable() alignment assumption\n\nGuenter reported dodgy crashes on an i386-nosmp build using GCC-11\nthat had the form of endless traps until entry stack exhaust and then\n#DF from the stack guard.\n\nIt turned out that pti_clone_pgtable() had alignment assumptions on\nthe start address, notably it hard assumes start is PMD aligned. This\nis true on x86_64, but very much not true on i386.\n\nThese assumptions can cause the end condition to malfunction, leading\nto a 'short' clone. Guess what happens when the user mapping has a\nshort copy of the entry text?\n\nUse the correct increment form for addr to avoid alignment\nassumptions.(CVE-2024-44965)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\ndrm/mgag200: Bind I2C lifetime to DRM device\n\nManaged cleanup with devm_add_action_or_reset() will release the I2C\nadapter when the underlying Linux device goes away. But the connector\nstill refers to it, so this cleanup leaves behind a stale pointer\nin struct drm_connector.ddc.\n\nBind the lifetime of the I2C adapter to the connector's lifetime by\nusing DRM's managed release. When the DRM device goes away (after\nthe Linux device) DRM will first clean up the connector and then\nclean up the I2C adapter.(CVE-2024-44967)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\ns390/sclp: Prevent release of buffer in I/O\n\nWhen a task waiting for completion of a Store Data operation is\ninterrupted, an attempt is made to halt this operation. If this attempt\nfails due to a hardware or firmware problem, there is a chance that the\nSCLP facility might store data into buffers referenced by the original\noperation at a later time.\n\nHandle this situation by not releasing the referenced data buffers if\nthe halt attempt fails. For current use cases, this might result in a\nleak of few pages of memory in case of a rare hardware/firmware\nmalfunction.(CVE-2024-44969)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nmptcp: pm: avoid possible UaF when selecting endp\n\nselect_local_address() and select_signal_address() both select an\nendpoint entry from the list inside an RCU protected section, but return\na reference to it, to be read later on. If the entry is dereferenced\nafter the RCU unlock, reading info could cause a Use-after-Free.\n\nA simple solution is to copy the required info while inside the RCU\nprotected section to avoid any risk of UaF later. The address ID might\nneed to be modified later to handle the ID0 case later, so a copy seems\nOK to deal with.(CVE-2024-44974)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nbnxt_en: Fix double DMA unmapping for XDP_REDIRECT\n\nRemove the dma_unmap_page_attrs() call in the driver's XDP_REDIRECT\ncode path.  This should have been removed when we let the page pool\nhandle the DMA mapping.  This bug causes the warning:\n\nWARNING: CPU: 7 PID: 59 at drivers/iommu/dma-iommu.c:1198 iommu_dma_unmap_page+0xd5/0x100\nCPU: 7 PID: 59 Comm: ksoftirqd/7 Tainted: G        W          6.8.0-1010-gcp #11-Ubuntu\nHardware name: Dell Inc. PowerEdge R7525/0PYVT1, BIOS 2.15.2 04/02/2024\nRIP: 0010:iommu_dma_unmap_page+0xd5/0x100\nCode: 89 ee 48 89 df e8 cb f2 69 ff 48 83 c4 08 5b 41 5c 41 5d 41 5e 41 5f 5d 31 c0 31 d2 31 c9 31 f6 31 ff 45 31 c0 e9 ab 17 71 00 <0f> 0b 48 83 c4 08 5b 41 5c 41 5d 41 5e 41 5f 5d 31 c0 31 d2 31 c9\nRSP: 0018:ffffab1fc0597a48 EFLAGS: 00010246\nRAX: 0000000000000000 RBX: ffff99ff838280c8 RCX: 0000000000000000\nRDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000\nRBP: ffffab1fc0597a78 R08: 0000000000000002 R09: ffffab1fc0597c1c\nR10: ffffab1fc0597cd3 R11: ffff99ffe375acd8 R12: 00000000e65b9000\nR13: 0000000000000050 R14: 0000000000001000 R15: 0000000000000002\nFS:  0000000000000000(0000) GS:ffff9a06efb80000(0000) knlGS:0000000000000000\nCS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000565c34c37210 CR3: 00000005c7e3e000 CR4: 0000000000350ef0\n? show_regs+0x6d/0x80\n? __warn+0x89/0x150\n? iommu_dma_unmap_page+0xd5/0x100\n? report_bug+0x16a/0x190\n? handle_bug+0x51/0xa0\n? exc_invalid_op+0x18/0x80\n? iommu_dma_unmap_page+0xd5/0x100\n? iommu_dma_unmap_page+0x35/0x100\ndma_unmap_page_attrs+0x55/0x220\n? bpf_prog_4d7e87c0d30db711_xdp_dispatcher+0x64/0x9f\nbnxt_rx_xdp+0x237/0x520 [bnxt_en]\nbnxt_rx_pkt+0x640/0xdd0 [bnxt_en]\n__bnxt_poll_work+0x1a1/0x3d0 [bnxt_en]\nbnxt_poll+0xaa/0x1e0 [bnxt_en]\n__napi_poll+0x33/0x1e0\nnet_rx_action+0x18a/0x2f0(CVE-2024-44984)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\ntcp: prevent concurrent execution of tcp_sk_exit_batch\n\nIts possible that two threads call tcp_sk_exit_batch() concurrently,\nonce from the cleanup_net workqueue, once from a task that failed to clone\na new netns.  In the latter case, error unwinding calls the exit handlers\nin reverse order for the 'failed' netns.\n\ntcp_sk_exit_batch() calls tcp_twsk_purge().\nProblem is that since commit b099ce2602d8 (\"net: Batch inet_twsk_purge\"),\nthis function picks up twsk in any dying netns, not just the one passed\nin via exit_batch list.\n\nThis means that the error unwind of setup_net() can \"steal\" and destroy\ntimewait sockets belonging to the exiting netns.\n\nThis allows the netns exit worker to proceed to call\n\nWARN_ON_ONCE(!refcount_dec_and_test(&net->ipv4.tcp_death_row.tw_refcount));\n\nwithout the expected 1 -> 0 transition, which then splats.\n\nAt same time, error unwind path that is also running inet_twsk_purge()\nwill splat as well:\n\nWARNING: .. at lib/refcount.c:31 refcount_warn_saturate+0x1ed/0x210\n...\n refcount_dec include/linux/refcount.h:351 [inline]\n inet_twsk_kill+0x758/0x9c0 net/ipv4/inet_timewait_sock.c:70\n inet_twsk_deschedule_put net/ipv4/inet_timewait_sock.c:221\n inet_twsk_purge+0x725/0x890 net/ipv4/inet_timewait_sock.c:304\n tcp_sk_exit_batch+0x1c/0x170 net/ipv4/tcp_ipv4.c:3522\n ops_exit_list+0x128/0x180 net/core/net_namespace.c:178\n setup_net+0x714/0xb40 net/core/net_namespace.c:375\n copy_net_ns+0x2f0/0x670 net/core/net_namespace.c:508\n create_new_namespaces+0x3ea/0xb10 kernel/nsproxy.c:110\n\n... because refcount_dec() of tw_refcount unexpectedly dropped to 0.\n\nThis doesn't seem like an actual bug (no tw sockets got lost and I don't\nsee a use-after-free) but as erroneous trigger of debug check.\n\nAdd a mutex to force strict ordering: the task that calls tcp_twsk_purge()\nblocks other task from doing final _dec_and_test before mutex-owner has\nremoved all tw sockets of dying netns.(CVE-2024-44991)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\niommu: Restore lost return in iommu_report_device_fault()\n\nWhen iommu_report_device_fault gets called with a partial fault it is\nsupposed to collect the fault into the group and then return.\n\nInstead the return was accidently deleted which results in trying to\nprocess the fault and an eventual crash.\n\nDeleting the return was a typo, put it back.(CVE-2024-44994)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nnet: hns3: fix a deadlock problem when config TC during resetting\n\nWhen config TC during the reset process, may cause a deadlock, the flow is\nas below:\n                             pf reset start\n                                 │\n                                 ▼\n                              ......\nsetup tc                         │\n    │                            ▼\n    ▼                      DOWN: napi_disable()\nnapi_disable()(skip)             │\n    │                            │\n    ▼                            ▼\n  ......                      ......\n    │                            │\n    ▼                            │\nnapi_enable()                    │\n                                 ▼\n                           UINIT: netif_napi_del()\n                                 │\n                                 ▼\n                              ......\n                                 │\n                                 ▼\n                           INIT: netif_napi_add()\n                                 │\n                                 ▼\n                              ......                 global reset start\n                                 │                      │\n                                 ▼                      ▼\n                           UP: napi_enable()(skip)    ......\n                                 │                      │\n                                 ▼                      ▼\n                              ......                 napi_disable()\n\nIn reset process, the driver will DOWN the port and then UINIT, in this\ncase, the setup tc process will UP the port before UINIT, so cause the\nproblem. Adds a DOWN process in UINIT to fix it.(CVE-2024-44995)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nvsock: fix recursive ->recvmsg calls\n\nAfter a vsock socket has been added to a BPF sockmap, its prot->recvmsg\nhas been replaced with vsock_bpf_recvmsg(). Thus the following\nrecursiion could happen:\n\nvsock_bpf_recvmsg()\n -> __vsock_recvmsg()\n  -> vsock_connectible_recvmsg()\n   -> prot->recvmsg()\n    -> vsock_bpf_recvmsg() again\n\nWe need to fix it by calling the original ->recvmsg() without any BPF\nsockmap logic in __vsock_recvmsg().(CVE-2024-44996)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\ngtp: pull network headers in gtp_dev_xmit()\n\nsyzbot/KMSAN reported use of uninit-value in get_dev_xmit() [1]\n\nWe must make sure the IPv4 or Ipv6 header is pulled in skb->head\nbefore accessing fields in them.\n\nUse pskb_inet_may_pull() to fix this issue.\n\n[1]\nBUG: KMSAN: uninit-value in ipv6_pdp_find drivers/net/gtp.c:220 [inline]\n BUG: KMSAN: uninit-value in gtp_build_skb_ip6 drivers/net/gtp.c:1229 [inline]\n BUG: KMSAN: uninit-value in gtp_dev_xmit+0x1424/0x2540 drivers/net/gtp.c:1281\n  ipv6_pdp_find drivers/net/gtp.c:220 [inline]\n  gtp_build_skb_ip6 drivers/net/gtp.c:1229 [inline]\n  gtp_dev_xmit+0x1424/0x2540 drivers/net/gtp.c:1281\n  __netdev_start_xmit include/linux/netdevice.h:4913 [inline]\n  netdev_start_xmit include/linux/netdevice.h:4922 [inline]\n  xmit_one net/core/dev.c:3580 [inline]\n  dev_hard_start_xmit+0x247/0xa20 net/core/dev.c:3596\n  __dev_queue_xmit+0x358c/0x5610 net/core/dev.c:4423\n  dev_queue_xmit include/linux/netdevice.h:3105 [inline]\n  packet_xmit+0x9c/0x6c0 net/packet/af_packet.c:276\n  packet_snd net/packet/af_packet.c:3145 [inline]\n  packet_sendmsg+0x90e3/0xa3a0 net/packet/af_packet.c:3177\n  sock_sendmsg_nosec net/socket.c:730 [inline]\n  __sock_sendmsg+0x30f/0x380 net/socket.c:745\n  __sys_sendto+0x685/0x830 net/socket.c:2204\n  __do_sys_sendto net/socket.c:2216 [inline]\n  __se_sys_sendto net/socket.c:2212 [inline]\n  __x64_sys_sendto+0x125/0x1d0 net/socket.c:2212\n  x64_sys_call+0x3799/0x3c10 arch/x86/include/generated/asm/syscalls_64.h:45\n  do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n  do_syscall_64+0xcd/0x1e0 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n\nUninit was created at:\n  slab_post_alloc_hook mm/slub.c:3994 [inline]\n  slab_alloc_node mm/slub.c:4037 [inline]\n  kmem_cache_alloc_node_noprof+0x6bf/0xb80 mm/slub.c:4080\n  kmalloc_reserve+0x13d/0x4a0 net/core/skbuff.c:583\n  __alloc_skb+0x363/0x7b0 net/core/skbuff.c:674\n  alloc_skb include/linux/skbuff.h:1320 [inline]\n  alloc_skb_with_frags+0xc8/0xbf0 net/core/skbuff.c:6526\n  sock_alloc_send_pskb+0xa81/0xbf0 net/core/sock.c:2815\n  packet_alloc_skb net/packet/af_packet.c:2994 [inline]\n  packet_snd net/packet/af_packet.c:3088 [inline]\n  packet_sendmsg+0x749c/0xa3a0 net/packet/af_packet.c:3177\n  sock_sendmsg_nosec net/socket.c:730 [inline]\n  __sock_sendmsg+0x30f/0x380 net/socket.c:745\n  __sys_sendto+0x685/0x830 net/socket.c:2204\n  __do_sys_sendto net/socket.c:2216 [inline]\n  __se_sys_sendto net/socket.c:2212 [inline]\n  __x64_sys_sendto+0x125/0x1d0 net/socket.c:2212\n  x64_sys_call+0x3799/0x3c10 arch/x86/include/generated/asm/syscalls_64.h:45\n  do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n  do_syscall_64+0xcd/0x1e0 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n\nCPU: 0 UID: 0 PID: 7115 Comm: syz.1.515 Not tainted 6.11.0-rc1-syzkaller-00043-g94ede2a3e913 #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024(CVE-2024-44999)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nfs/netfs/fscache_cookie: add missing \"n_accesses\" check\n\nThis fixes a NULL pointer dereference bug due to a data race which\nlooks like this:\n\n  BUG: kernel NULL pointer dereference, address: 0000000000000008\n  #PF: supervisor read access in kernel mode\n  #PF: error_code(0x0000) - not-present page\n  PGD 0 P4D 0\n  Oops: 0000 [#1] SMP PTI\n  CPU: 33 PID: 16573 Comm: kworker/u97:799 Not tainted 6.8.7-cm4all1-hp+ #43\n  Hardware name: HP ProLiant DL380 Gen9/ProLiant DL380 Gen9, BIOS P89 10/17/2018\n  Workqueue: events_unbound netfs_rreq_write_to_cache_work\n  RIP: 0010:cachefiles_prepare_write+0x30/0xa0\n  Code: 57 41 56 45 89 ce 41 55 49 89 cd 41 54 49 89 d4 55 53 48 89 fb 48 83 ec 08 48 8b 47 08 48 83 7f 10 00 48 89 34 24 48 8b 68 20 <48> 8b 45 08 4c 8b 38 74 45 49 8b 7f 50 e8 4e a9 b0 ff 48 8b 73 10\n  RSP: 0018:ffffb4e78113bde0 EFLAGS: 00010286\n  RAX: ffff976126be6d10 RBX: ffff97615cdb8438 RCX: 0000000000020000\n  RDX: ffff97605e6c4c68 RSI: ffff97605e6c4c60 RDI: ffff97615cdb8438\n  RBP: 0000000000000000 R08: 0000000000278333 R09: 0000000000000001\n  R10: ffff97605e6c4600 R11: 0000000000000001 R12: ffff97605e6c4c68\n  R13: 0000000000020000 R14: 0000000000000001 R15: ffff976064fe2c00\n  FS:  0000000000000000(0000) GS:ffff9776dfd40000(0000) knlGS:0000000000000000\n  CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n  CR2: 0000000000000008 CR3: 000000005942c002 CR4: 00000000001706f0\n  Call Trace:\n   <TASK>\n   ? __die+0x1f/0x70\n   ? page_fault_oops+0x15d/0x440\n   ? search_module_extables+0xe/0x40\n   ? fixup_exception+0x22/0x2f0\n   ? exc_page_fault+0x5f/0x100\n   ? asm_exc_page_fault+0x22/0x30\n   ? cachefiles_prepare_write+0x30/0xa0\n   netfs_rreq_write_to_cache_work+0x135/0x2e0\n   process_one_work+0x137/0x2c0\n   worker_thread+0x2e9/0x400\n   ? __pfx_worker_thread+0x10/0x10\n   kthread+0xcc/0x100\n   ? __pfx_kthread+0x10/0x10\n   ret_from_fork+0x30/0x50\n   ? __pfx_kthread+0x10/0x10\n   ret_from_fork_asm+0x1b/0x30\n   </TASK>\n  Modules linked in:\n  CR2: 0000000000000008\n  ---[ end trace 0000000000000000 ]---\n\nThis happened because fscache_cookie_state_machine() was slow and was\nstill running while another process invoked fscache_unuse_cookie();\nthis led to a fscache_cookie_lru_do_one() call, setting the\nFSCACHE_COOKIE_DO_LRU_DISCARD flag, which was picked up by\nfscache_cookie_state_machine(), withdrawing the cookie via\ncachefiles_withdraw_cookie(), clearing cookie->cache_priv.\n\nAt the same time, yet another process invoked\ncachefiles_prepare_write(), which found a NULL pointer in this code\nline:\n\n  struct cachefiles_object *object = cachefiles_cres_object(cres);\n\nThe next line crashes, obviously:\n\n  struct cachefiles_cache *cache = object->volume->cache;\n\nDuring cachefiles_prepare_write(), the \"n_accesses\" counter is\nnon-zero (via fscache_begin_operation()).  The cookie must not be\nwithdrawn until it drops to zero.\n\nThe counter is checked by fscache_cookie_state_machine() before\nswitching to FSCACHE_COOKIE_STATE_RELINQUISHING and\nFSCACHE_COOKIE_STATE_WITHDRAWING (in \"case\nFSCACHE_COOKIE_STATE_FAILED\"), but not for\nFSCACHE_COOKIE_STATE_LRU_DISCARDING (\"case\nFSCACHE_COOKIE_STATE_ACTIVE\").\n\nThis patch adds the missing check.  With a non-zero access counter,\nthe function returns and the next fscache_end_cookie_access() call\nwill queue another fscache_cookie_state_machine() call to handle the\nstill-pending FSCACHE_COOKIE_DO_LRU_DISCARD.(CVE-2024-45000)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nrtla/osnoise: Prevent NULL dereference in error handling\n\nIf the \"tool->data\" allocation fails then there is no need to call\nosnoise_free_top() and, in fact, doing so will lead to a NULL dereference.(CVE-2024-45002)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nvfs: Don't evict inode under the inode lru traversing context\n\nThe inode reclaiming process(See function prune_icache_sb) collects all\nreclaimable inodes and mark them with I_FREEING flag at first, at that\ntime, other processes will be stuck if they try getting these inodes\n(See function find_inode_fast), then the reclaiming process destroy the\ninodes by function dispose_list(). Some filesystems(eg. ext4 with\nea_inode feature, ubifs with xattr) may do inode lookup in the inode\nevicting callback function, if the inode lookup is operated under the\ninode lru traversing context, deadlock problems may happen.\n\nCase 1: In function ext4_evict_inode(), the ea inode lookup could happen\n        if ea_inode feature is enabled, the lookup process will be stuck\n\tunder the evicting context like this:\n\n 1. File A has inode i_reg and an ea inode i_ea\n 2. getfattr(A, xattr_buf) // i_ea is added into lru // lru->i_ea\n 3. Then, following three processes running like this:\n\n    PA                              PB\n echo 2 > /proc/sys/vm/drop_caches\n  shrink_slab\n   prune_dcache_sb\n   // i_reg is added into lru, lru->i_ea->i_reg\n   prune_icache_sb\n    list_lru_walk_one\n     inode_lru_isolate\n      i_ea->i_state |= I_FREEING // set inode state\n     inode_lru_isolate\n      __iget(i_reg)\n      spin_unlock(&i_reg->i_lock)\n      spin_unlock(lru_lock)\n                                     rm file A\n                                      i_reg->nlink = 0\n      iput(i_reg) // i_reg->nlink is 0, do evict\n       ext4_evict_inode\n        ext4_xattr_delete_inode\n         ext4_xattr_inode_dec_ref_all\n          ext4_xattr_inode_iget\n           ext4_iget(i_ea->i_ino)\n            iget_locked\n             find_inode_fast\n              __wait_on_freeing_inode(i_ea) ----→ AA deadlock\n    dispose_list // cannot be executed by prune_icache_sb\n     wake_up_bit(&i_ea->i_state)\n\nCase 2: In deleted inode writing function ubifs_jnl_write_inode(), file\n        deleting process holds BASEHD's wbuf->io_mutex while getting the\n\txattr inode, which could race with inode reclaiming process(The\n        reclaiming process could try locking BASEHD's wbuf->io_mutex in\n\tinode evicting function), then an ABBA deadlock problem would\n\thappen as following:\n\n 1. File A has inode ia and a xattr(with inode ixa), regular file B has\n    inode ib and a xattr.\n 2. getfattr(A, xattr_buf) // ixa is added into lru // lru->ixa\n 3. Then, following three processes running like this:\n\n        PA                PB                        PC\n                echo 2 > /proc/sys/vm/drop_caches\n                 shrink_slab\n                  prune_dcache_sb\n                  // ib and ia are added into lru, lru->ixa->ib->ia\n                  prune_icache_sb\n                   list_lru_walk_one\n                    inode_lru_isolate\n                     ixa->i_state |= I_FREEING // set inode state\n                    inode_lru_isolate\n                     __iget(ib)\n                     spin_unlock(&ib->i_lock)\n                     spin_unlock(lru_lock)\n                                                   rm file B\n                                                    ib->nlink = 0\n rm file A\n  iput(ia)\n   ubifs_evict_inode(ia)\n    ubifs_jnl_delete_inode(ia)\n     ubifs_jnl_write_inode(ia)\n      make_reservation(BASEHD) // Lock wbuf->io_mutex\n      ubifs_iget(ixa->i_ino)\n       iget_locked\n        find_inode_fast\n         __wait_on_freeing_inode(ixa)\n          |          iput(ib) // ib->nlink is 0, do evict\n          |           ubifs_evict_inode\n          |            ubifs_jnl_delete_inode(ib)\n          ↓             ubifs_jnl_write_inode\n     ABBA deadlock ←-----make_reservation(BASEHD)\n                   dispose_list // cannot be executed by prune_icache_sb\n                    wake_up_bit(&ixa->i_state)\n\nFix the possible deadlock by using new inode state flag I_LRU_ISOLATING\nto pin the inode in memory while inode_lru_isolate(\n---truncated---(CVE-2024-45003)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nInput: MT - limit max slots\n\nsyzbot is reporting too large allocation at input_mt_init_slots(), for\nnum_slots is supplied from userspace using ioctl(UI_DEV_CREATE).\n\nSince nobody knows possible max slots, this patch chose 1024.(CVE-2024-45008)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx5e: Take state lock during tx timeout reporter\n\nmlx5e_safe_reopen_channels() requires the state lock taken. The\nreferenced changed in the Fixes tag removed the lock to fix another\nissue. This patch adds it back but at a later point (when calling\nmlx5e_safe_reopen_channels()) to avoid the deadlock referenced in the\nFixes tag.(CVE-2024-45019)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nfix bitmap corruption on close_range() with CLOSE_RANGE_UNSHARE\n\ncopy_fd_bitmaps(new, old, count) is expected to copy the first\ncount/BITS_PER_LONG bits from old->full_fds_bits[] and fill\nthe rest with zeroes.  What it does is copying enough words\n(BITS_TO_LONGS(count/BITS_PER_LONG)), then memsets the rest.\nThat works fine, *if* all bits past the cutoff point are\nclear.  Otherwise we are risking garbage from the last word\nwe'd copied.\n\nFor most of the callers that is true - expand_fdtable() has\ncount equal to old->max_fds, so there's no open descriptors\npast count, let alone fully occupied words in ->open_fds[],\nwhich is what bits in ->full_fds_bits[] correspond to.\n\nThe other caller (dup_fd()) passes sane_fdtable_size(old_fdt, max_fds),\nwhich is the smallest multiple of BITS_PER_LONG that covers all\nopened descriptors below max_fds.  In the common case (copying on\nfork()) max_fds is ~0U, so all opened descriptors will be below\nit and we are fine, by the same reasons why the call in expand_fdtable()\nis safe.\n\nUnfortunately, there is a case where max_fds is less than that\nand where we might, indeed, end up with junk in ->full_fds_bits[] -\nclose_range(from, to, CLOSE_RANGE_UNSHARE) with\n\t* descriptor table being currently shared\n\t* 'to' being above the current capacity of descriptor table\n\t* 'from' being just under some chunk of opened descriptors.\nIn that case we end up with observably wrong behaviour - e.g. spawn\na child with CLONE_FILES, get all descriptors in range 0..127 open,\nthen close_range(64, ~0U, CLOSE_RANGE_UNSHARE) and watch dup(0) ending\nup with descriptor #128, despite #64 being observably not open.\n\nThe minimally invasive fix would be to deal with that in dup_fd().\nIf this proves to add measurable overhead, we can go that way, but\nlet's try to fix copy_fd_bitmaps() first.\n\n* new helper: bitmap_copy_and_expand(to, from, bits_to_copy, size).\n* make copy_fd_bitmaps() take the bitmap size in words, rather than\nbits; it's 'count' argument is always a multiple of BITS_PER_LONG,\nso we are not losing any information, and that way we can use the\nsame helper for all three bitmaps - compiler will see that count\nis a multiple of BITS_PER_LONG for the large ones, so it'll generate\nplain memcpy()+memset().\n\nReproducer added to tools/testing/selftests/core/close_range_test.c(CVE-2024-45025)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: fix a use-after-free when hitting errors inside btrfs_submit_chunk()\n\n[BUG]\nThere is an internal report that KASAN is reporting use-after-free, with\nthe following backtrace:\n\n  BUG: KASAN: slab-use-after-free in btrfs_check_read_bio+0xa68/0xb70 [btrfs]\n  Read of size 4 at addr ffff8881117cec28 by task kworker/u16:2/45\n  CPU: 1 UID: 0 PID: 45 Comm: kworker/u16:2 Not tainted 6.11.0-rc2-next-20240805-default+ #76\n  Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.2-3-gd478f380-rebuilt.opensuse.org 04/01/2014\n  Workqueue: btrfs-endio btrfs_end_bio_work [btrfs]\n  Call Trace:\n   dump_stack_lvl+0x61/0x80\n   print_address_description.constprop.0+0x5e/0x2f0\n   print_report+0x118/0x216\n   kasan_report+0x11d/0x1f0\n   btrfs_check_read_bio+0xa68/0xb70 [btrfs]\n   process_one_work+0xce0/0x12a0\n   worker_thread+0x717/0x1250\n   kthread+0x2e3/0x3c0\n   ret_from_fork+0x2d/0x70\n   ret_from_fork_asm+0x11/0x20\n\n  Allocated by task 20917:\n   kasan_save_stack+0x37/0x60\n   kasan_save_track+0x10/0x30\n   __kasan_slab_alloc+0x7d/0x80\n   kmem_cache_alloc_noprof+0x16e/0x3e0\n   mempool_alloc_noprof+0x12e/0x310\n   bio_alloc_bioset+0x3f0/0x7a0\n   btrfs_bio_alloc+0x2e/0x50 [btrfs]\n   submit_extent_page+0x4d1/0xdb0 [btrfs]\n   btrfs_do_readpage+0x8b4/0x12a0 [btrfs]\n   btrfs_readahead+0x29a/0x430 [btrfs]\n   read_pages+0x1a7/0xc60\n   page_cache_ra_unbounded+0x2ad/0x560\n   filemap_get_pages+0x629/0xa20\n   filemap_read+0x335/0xbf0\n   vfs_read+0x790/0xcb0\n   ksys_read+0xfd/0x1d0\n   do_syscall_64+0x6d/0x140\n   entry_SYSCALL_64_after_hwframe+0x4b/0x53\n\n  Freed by task 20917:\n   kasan_save_stack+0x37/0x60\n   kasan_save_track+0x10/0x30\n   kasan_save_free_info+0x37/0x50\n   __kasan_slab_free+0x4b/0x60\n   kmem_cache_free+0x214/0x5d0\n   bio_free+0xed/0x180\n   end_bbio_data_read+0x1cc/0x580 [btrfs]\n   btrfs_submit_chunk+0x98d/0x1880 [btrfs]\n   btrfs_submit_bio+0x33/0x70 [btrfs]\n   submit_one_bio+0xd4/0x130 [btrfs]\n   submit_extent_page+0x3ea/0xdb0 [btrfs]\n   btrfs_do_readpage+0x8b4/0x12a0 [btrfs]\n   btrfs_readahead+0x29a/0x430 [btrfs]\n   read_pages+0x1a7/0xc60\n   page_cache_ra_unbounded+0x2ad/0x560\n   filemap_get_pages+0x629/0xa20\n   filemap_read+0x335/0xbf0\n   vfs_read+0x790/0xcb0\n   ksys_read+0xfd/0x1d0\n   do_syscall_64+0x6d/0x140\n   entry_SYSCALL_64_after_hwframe+0x4b/0x53\n\n[CAUSE]\nAlthough I cannot reproduce the error, the report itself is good enough\nto pin down the cause.\n\nThe call trace is the regular endio workqueue context, but the\nfree-by-task trace is showing that during btrfs_submit_chunk() we\nalready hit a critical error, and is calling btrfs_bio_end_io() to error\nout.  And the original endio function called bio_put() to free the whole\nbio.\n\nThis means a double freeing thus causing use-after-free, e.g.:\n\n1. Enter btrfs_submit_bio() with a read bio\n   The read bio length is 128K, crossing two 64K stripes.\n\n2. The first run of btrfs_submit_chunk()\n\n2.1 Call btrfs_map_block(), which returns 64K\n2.2 Call btrfs_split_bio()\n    Now there are two bios, one referring to the first 64K, the other\n    referring to the second 64K.\n2.3 The first half is submitted.\n\n3. The second run of btrfs_submit_chunk()\n\n3.1 Call btrfs_map_block(), which by somehow failed\n    Now we call btrfs_bio_end_io() to handle the error\n\n3.2 btrfs_bio_end_io() calls the original endio function\n    Which is end_bbio_data_read(), and it calls bio_put() for the\n    original bio.\n\n    Now the original bio is freed.\n\n4. The submitted first 64K bio finished\n   Now we call into btrfs_check_read_bio() and tries to advance the bio\n   iter.\n   But since the original bio (thus its iter) is already freed, we\n   trigger the above use-after free.\n\n   And even if the memory is not poisoned/corrupted, we will later call\n   the original endio function, causing a double freeing.\n\n[FIX]\nInstead of calling btrfs_bio_end_io(), call btrfs_orig_bbio_end_io(),\nwhich has the extra check on split bios and do the pr\n---truncated---(CVE-2024-46687)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\ntty: serial: fsl_lpuart: mark last busy before uart_add_one_port\n\nWith \"earlycon initcall_debug=1 loglevel=8\" in bootargs, kernel\nsometimes boot hang. It is because normal console still is not ready,\nbut runtime suspend is called, so early console putchar will hang\nin waiting TRDE set in UARTSTAT.\n\nThe lpuart driver has auto suspend delay set to 3000ms, but during\nuart_add_one_port, a child device serial ctrl will added and probed with\nits pm runtime enabled(see serial_ctrl.c).\nThe runtime suspend call path is:\ndevice_add\n     |-> bus_probe_device\n           |->device_initial_probe\n\t           |->__device_attach\n                         |-> pm_runtime_get_sync(dev->parent);\n\t\t\t |-> pm_request_idle(dev);\n\t\t\t |-> pm_runtime_put(dev->parent);\n\nSo in the end, before normal console ready, the lpuart get runtime\nsuspended. And earlycon putchar will hang.\n\nTo address the issue, mark last busy just after pm_runtime_enable,\nthree seconds is long enough to switch from bootconsole to normal\nconsole.(CVE-2024-46706)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Skip wbscl_set_scaler_filter if filter is null\n\nCallers can pass null in filter (i.e. from returned from the function\nwbscl_get_filter_coeffs_16p) and a null check is added to ensure that is\nnot the case.\n\nThis fixes 4 NULL_RETURNS issues reported by Coverity.(CVE-2024-46714)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amdgpu: fix dereference after null check\n\ncheck the pointer hive before use.(CVE-2024-46720)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amdgpu: fix ucode out-of-bounds read warning\n\nClear warning that read ucode[] may out-of-bounds.(CVE-2024-46723)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/pm: fix the Out-of-bounds read warning\n\nusing index i - 1U may beyond element index\nfor mc_data[] when i = 0.(CVE-2024-46731)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: fix qgroup reserve leaks in cow_file_range\n\nIn the buffered write path, the dirty page owns the qgroup reserve until\nit creates an ordered_extent.\n\nTherefore, any errors that occur before the ordered_extent is created\nmust free that reservation, or else the space is leaked. The fstest\ngeneric/475 exercises various IO error paths, and is able to trigger\nerrors in cow_file_range where we fail to get to allocating the ordered\nextent. Note that because we *do* clear delalloc, we are likely to\nremove the inode from the delalloc list, so the inodes/pages to not have\ninvalidate/launder called on them in the commit abort path.\n\nThis results in failures at the unmount stage of the test that look like:\n\n  BTRFS: error (device dm-8 state EA) in cleanup_transaction:2018: errno=-5 IO failure\n  BTRFS: error (device dm-8 state EA) in btrfs_replace_file_extents:2416: errno=-5 IO failure\n  BTRFS warning (device dm-8 state EA): qgroup 0/5 has unreleased space, type 0 rsv 28672\n  ------------[ cut here ]------------\n  WARNING: CPU: 3 PID: 22588 at fs/btrfs/disk-io.c:4333 close_ctree+0x222/0x4d0 [btrfs]\n  Modules linked in: btrfs blake2b_generic libcrc32c xor zstd_compress raid6_pq\n  CPU: 3 PID: 22588 Comm: umount Kdump: loaded Tainted: G W          6.10.0-rc7-gab56fde445b8 #21\n  Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS Arch Linux 1.16.3-1-1 04/01/2014\n  RIP: 0010:close_ctree+0x222/0x4d0 [btrfs]\n  RSP: 0018:ffffb4465283be00 EFLAGS: 00010202\n  RAX: 0000000000000001 RBX: ffffa1a1818e1000 RCX: 0000000000000001\n  RDX: 0000000000000000 RSI: ffffb4465283bbe0 RDI: ffffa1a19374fcb8\n  RBP: ffffa1a1818e13c0 R08: 0000000100028b16 R09: 0000000000000000\n  R10: 0000000000000003 R11: 0000000000000003 R12: ffffa1a18ad7972c\n  R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000\n  FS:  00007f9168312b80(0000) GS:ffffa1a4afcc0000(0000) knlGS:0000000000000000\n  CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n  CR2: 00007f91683c9140 CR3: 000000010acaa000 CR4: 00000000000006f0\n  Call Trace:\n   <TASK>\n   ? close_ctree+0x222/0x4d0 [btrfs]\n   ? __warn.cold+0x8e/0xea\n   ? close_ctree+0x222/0x4d0 [btrfs]\n   ? report_bug+0xff/0x140\n   ? handle_bug+0x3b/0x70\n   ? exc_invalid_op+0x17/0x70\n   ? asm_exc_invalid_op+0x1a/0x20\n   ? close_ctree+0x222/0x4d0 [btrfs]\n   generic_shutdown_super+0x70/0x160\n   kill_anon_super+0x11/0x40\n   btrfs_kill_super+0x11/0x20 [btrfs]\n   deactivate_locked_super+0x2e/0xa0\n   cleanup_mnt+0xb5/0x150\n   task_work_run+0x57/0x80\n   syscall_exit_to_user_mode+0x121/0x130\n   do_syscall_64+0xab/0x1a0\n   entry_SYSCALL_64_after_hwframe+0x77/0x7f\n  RIP: 0033:0x7f916847a887\n  ---[ end trace 0000000000000000 ]---\n  BTRFS error (device dm-8 state EA): qgroup reserved space leaked\n\nCases 2 and 3 in the out_reserve path both pertain to this type of leak\nand must free the reserved qgroup data. Because it is already an error\npath, I opted not to handle the possible errors in\nbtrfs_free_qgroup_data.(CVE-2024-46733)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nsmb/server: fix potential null-ptr-deref of lease_ctx_info in smb2_open()\n\nnull-ptr-deref will occur when (req_op_level == SMB2_OPLOCK_LEVEL_LEASE)\nand parse_lease_state() return NULL.\n\nFix this by check if 'lease_ctx_info' is NULL.\n\nAdditionally, remove the redundant parentheses in\nparse_durable_handle_context().(CVE-2024-46742)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nSquashfs: sanity check symbolic link size\n\nSyzkiller reports a \"KMSAN: uninit-value in pick_link\" bug.\n\nThis is caused by an uninitialised page, which is ultimately caused\nby a corrupted symbolic link size read from disk.\n\nThe reason why the corrupted symlink size causes an uninitialised\npage is due to the following sequence of events:\n\n1. squashfs_read_inode() is called to read the symbolic\n   link from disk.  This assigns the corrupted value\n   3875536935 to inode->i_size.\n\n2. Later squashfs_symlink_read_folio() is called, which assigns\n   this corrupted value to the length variable, which being a\n   signed int, overflows producing a negative number.\n\n3. The following loop that fills in the page contents checks that\n   the copied bytes is less than length, which being negative means\n   the loop is skipped, producing an uninitialised page.\n\nThis patch adds a sanity check which checks that the symbolic\nlink size is not larger than expected.\n\n--\n\nV2: fix spelling mistake.(CVE-2024-46744)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nInput: uinput - reject requests with unreasonable number of slots\n\n\nWhen exercising uinput interface syzkaller may try setting up device\nwith a really large number of slots, which causes memory allocation\nfailure in input_mt_init_slots(). While this allocation failure is\nhandled properly and request is rejected, it results in syzkaller\nreports. Additionally, such request may put undue burden on the\nsystem which will try to free a lot of memory for a bogus request.\n\nFix it by limiting allowed number of slots to 100. This can easily\nbe extended if we see devices that can track more than 100 contacts.(CVE-2024-46745)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nHID: cougar: fix slab-out-of-bounds Read in cougar_report_fixup\n\nreport_fixup for the Cougar 500k Gaming Keyboard was not verifying\nthat the report descriptor size was correct before accessing it(CVE-2024-46747)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: don't BUG_ON() when 0 reference count at btrfs_lookup_extent_info()\n\nInstead of doing a BUG_ON() handle the error by returning -EUCLEAN,\naborting the transaction and logging an error message.(CVE-2024-46751)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: replace BUG_ON() with error handling at update_ref_for_cow()\n\nInstead of a BUG_ON() just return an error, log an error message and\nabort the transaction in case we find an extent buffer belonging to the\nrelocation tree that doesn't have the full backref flag set. This is\nunexpected and should never happen (save for bugs or a potential bad\nmemory).(CVE-2024-46752)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nhwmon: (adc128d818) Fix underflows seen when writing limit attributes\n\nDIV_ROUND_CLOSEST() after kstrtol() results in an underflow if a large\nnegative number such as -9223372036854775808 is provided by the user.\nFix it by reordering clamp_val() and DIV_ROUND_CLOSEST() operations.(CVE-2024-46759)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\neventfs: Use list_del_rcu() for SRCU protected list variable\n\nChi Zhiling reported:\n\n  We found a null pointer accessing in tracefs[1], the reason is that the\n  variable 'ei_child' is set to LIST_POISON1, that means the list was\n  removed in eventfs_remove_rec. so when access the ei_child->is_freed, the\n  panic triggered.\n\n  by the way, the following script can reproduce this panic\n\n  loop1 (){\n      while true\n      do\n          echo \"p:kp submit_bio\" > /sys/kernel/debug/tracing/kprobe_events\n          echo \"\" > /sys/kernel/debug/tracing/kprobe_events\n      done\n  }\n  loop2 (){\n      while true\n      do\n          tree /sys/kernel/debug/tracing/events/kprobes/\n      done\n  }\n  loop1 &\n  loop2\n\n  [1]:\n  [ 1147.959632][T17331] Unable to handle kernel paging request at virtual address dead000000000150\n  [ 1147.968239][T17331] Mem abort info:\n  [ 1147.971739][T17331]   ESR = 0x0000000096000004\n  [ 1147.976172][T17331]   EC = 0x25: DABT (current EL), IL = 32 bits\n  [ 1147.982171][T17331]   SET = 0, FnV = 0\n  [ 1147.985906][T17331]   EA = 0, S1PTW = 0\n  [ 1147.989734][T17331]   FSC = 0x04: level 0 translation fault\n  [ 1147.995292][T17331] Data abort info:\n  [ 1147.998858][T17331]   ISV = 0, ISS = 0x00000004, ISS2 = 0x00000000\n  [ 1148.005023][T17331]   CM = 0, WnR = 0, TnD = 0, TagAccess = 0\n  [ 1148.010759][T17331]   GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0\n  [ 1148.016752][T17331] [dead000000000150] address between user and kernel address ranges\n  [ 1148.024571][T17331] Internal error: Oops: 0000000096000004 [#1] SMP\n  [ 1148.030825][T17331] Modules linked in: team_mode_loadbalance team nlmon act_gact cls_flower sch_ingress bonding tls macvlan dummy ib_core bridge stp llc veth amdgpu amdxcp mfd_core gpu_sched drm_exec drm_buddy radeon crct10dif_ce video drm_suballoc_helper ghash_ce drm_ttm_helper sha2_ce ttm sha256_arm64 i2c_algo_bit sha1_ce sbsa_gwdt cp210x drm_display_helper cec sr_mod cdrom drm_kms_helper binfmt_misc sg loop fuse drm dm_mod nfnetlink ip_tables autofs4 [last unloaded: tls]\n  [ 1148.072808][T17331] CPU: 3 PID: 17331 Comm: ls Tainted: G        W         ------- ----  6.6.43 #2\n  [ 1148.081751][T17331] Source Version: 21b3b386e948bedd29369af66f3e98ab01b1c650\n  [ 1148.088783][T17331] Hardware name: Greatwall GW-001M1A-FTF/GW-001M1A-FTF, BIOS KunLun BIOS V4.0 07/16/2020\n  [ 1148.098419][T17331] pstate: 20000005 (nzCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n  [ 1148.106060][T17331] pc : eventfs_iterate+0x2c0/0x398\n  [ 1148.111017][T17331] lr : eventfs_iterate+0x2fc/0x398\n  [ 1148.115969][T17331] sp : ffff80008d56bbd0\n  [ 1148.119964][T17331] x29: ffff80008d56bbf0 x28: ffff001ff5be2600 x27: 0000000000000000\n  [ 1148.127781][T17331] x26: ffff001ff52ca4e0 x25: 0000000000009977 x24: dead000000000100\n  [ 1148.135598][T17331] x23: 0000000000000000 x22: 000000000000000b x21: ffff800082645f10\n  [ 1148.143415][T17331] x20: ffff001fddf87c70 x19: ffff80008d56bc90 x18: 0000000000000000\n  [ 1148.151231][T17331] x17: 0000000000000000 x16: 0000000000000000 x15: ffff001ff52ca4e0\n  [ 1148.159048][T17331] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000\n  [ 1148.166864][T17331] x11: 0000000000000000 x10: 0000000000000000 x9 : ffff8000804391d0\n  [ 1148.174680][T17331] x8 : 0000000180000000 x7 : 0000000000000018 x6 : 0000aaab04b92862\n  [ 1148.182498][T17331] x5 : 0000aaab04b92862 x4 : 0000000080000000 x3 : 0000000000000068\n  [ 1148.190314][T17331] x2 : 000000000000000f x1 : 0000000000007ea8 x0 : 0000000000000001\n  [ 1148.198131][T17331] Call trace:\n  [ 1148.201259][T17331]  eventfs_iterate+0x2c0/0x398\n  [ 1148.205864][T17331]  iterate_dir+0x98/0x188\n  [ 1148.210036][T17331]  __arm64_sys_getdents64+0x78/0x160\n  [ 1148.215161][T17331]  invoke_syscall+0x78/0x108\n  [ 1148.219593][T17331]  el0_svc_common.constprop.0+0x48/0xf0\n  [ 1148.224977][T17331]  do_el0_svc+0x24/0x38\n  [ 1148.228974][T17331]  el0_svc+0x40/0x168\n  [ 1148.232798][T17\n---truncated---(CVE-2024-46785)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nfscache: delete fscache_cookie_lru_timer when fscache exits to avoid UAF\n\nThe fscache_cookie_lru_timer is initialized when the fscache module\nis inserted, but is not deleted when the fscache module is removed.\nIf timer_reduce() is called before removing the fscache module,\nthe fscache_cookie_lru_timer will be added to the timer list of\nthe current cpu. Afterwards, a use-after-free will be triggered\nin the softIRQ after removing the fscache module, as follows:\n\n==================================================================\nBUG: unable to handle page fault for address: fffffbfff803c9e9\n PF: supervisor read access in kernel mode\n PF: error_code(0x0000) - not-present page\nPGD 21ffea067 P4D 21ffea067 PUD 21ffe6067 PMD 110a7c067 PTE 0\nOops: Oops: 0000 [#1] PREEMPT SMP KASAN PTI\nCPU: 1 UID: 0 PID: 0 Comm: swapper/1 Tainted: G W 6.11.0-rc3 #855\nTainted: [W]=WARN\nRIP: 0010:__run_timer_base.part.0+0x254/0x8a0\nCall Trace:\n <IRQ>\n tmigr_handle_remote_up+0x627/0x810\n __walk_groups.isra.0+0x47/0x140\n tmigr_handle_remote+0x1fa/0x2f0\n handle_softirqs+0x180/0x590\n irq_exit_rcu+0x84/0xb0\n sysvec_apic_timer_interrupt+0x6e/0x90\n </IRQ>\n <TASK>\n asm_sysvec_apic_timer_interrupt+0x1a/0x20\nRIP: 0010:default_idle+0xf/0x20\n default_idle_call+0x38/0x60\n do_idle+0x2b5/0x300\n cpu_startup_entry+0x54/0x60\n start_secondary+0x20d/0x280\n common_startup_64+0x13e/0x148\n </TASK>\nModules linked in: [last unloaded: netfs]\n==================================================================\n\nTherefore delete fscache_cookie_lru_timer when removing the fscahe module.(CVE-2024-46786)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nsch/netem: fix use after free in netem_dequeue\n\nIf netem_dequeue() enqueues packet to inner qdisc and that qdisc\nreturns __NET_XMIT_STOLEN. The packet is dropped but\nqdisc_tree_reduce_backlog() is not called to update the parent's\nq.qlen, leading to the similar use-after-free as Commit\ne04991a48dbaf382 (\"netem: fix return value if duplicate enqueue\nfails\")\n\nCommands to trigger KASAN UaF:\n\nip link add type dummy\nip link set lo up\nip link set dummy0 up\ntc qdisc add dev lo parent root handle 1: drr\ntc filter add dev lo parent 1: basic classid 1:1\ntc class add dev lo classid 1:1 drr\ntc qdisc add dev lo parent 1:1 handle 2: netem\ntc qdisc add dev lo parent 2: handle 3: drr\ntc filter add dev lo parent 3: basic classid 3:1 action mirred egress\nredirect dev dummy0\ntc class add dev lo classid 3:1 drr\nping -c1 -W0.01 localhost # Trigger bug\ntc class del dev lo classid 1:1\ntc class add dev lo classid 1:1 drr\nping -c1 -W0.01 localhost # UaF(CVE-2024-46800)",
				"category":"general",
				"title":"Description"
			},
			{
				"text":"An update for kernel is now available for openEuler-24.03-LTS.\n\nopenEuler Security has rated this update as having a security impact of high. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.",
				"category":"general",
				"title":"Topic"
			},
			{
				"text":"High",
				"category":"general",
				"title":"Severity"
			},
			{
				"text":"kernel",
				"category":"general",
				"title":"Affected Component"
			}
		],
		"publisher":{
			"issuing_authority":"openEuler security committee",
			"name":"openEuler",
			"namespace":"https://www.openeuler.org",
			"contact_details":"openeuler-security@openeuler.org",
			"category":"vendor"
		},
		"references":[
			{
				"summary":"openEuler-SA-2024-2181",
				"category":"self",
				"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2181"
			},
			{
				"summary":"CVE-2024-36904",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-36904&packageName=kernel"
			},
			{
				"summary":"CVE-2024-41008",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-41008&packageName=kernel"
			},
			{
				"summary":"CVE-2024-43904",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-43904&packageName=kernel"
			},
			{
				"summary":"CVE-2024-44954",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-44954&packageName=kernel"
			},
			{
				"summary":"CVE-2024-44959",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-44959&packageName=kernel"
			},
			{
				"summary":"CVE-2024-44962",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-44962&packageName=kernel"
			},
			{
				"summary":"CVE-2024-44965",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-44965&packageName=kernel"
			},
			{
				"summary":"CVE-2024-44967",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-44967&packageName=kernel"
			},
			{
				"summary":"CVE-2024-44969",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-44969&packageName=kernel"
			},
			{
				"summary":"CVE-2024-44974",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-44974&packageName=kernel"
			},
			{
				"summary":"CVE-2024-44984",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-44984&packageName=kernel"
			},
			{
				"summary":"CVE-2024-44991",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-44991&packageName=kernel"
			},
			{
				"summary":"CVE-2024-44994",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-44994&packageName=kernel"
			},
			{
				"summary":"CVE-2024-44995",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-44995&packageName=kernel"
			},
			{
				"summary":"CVE-2024-44996",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-44996&packageName=kernel"
			},
			{
				"summary":"CVE-2024-44999",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-44999&packageName=kernel"
			},
			{
				"summary":"CVE-2024-45000",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-45000&packageName=kernel"
			},
			{
				"summary":"CVE-2024-45002",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-45002&packageName=kernel"
			},
			{
				"summary":"CVE-2024-45003",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-45003&packageName=kernel"
			},
			{
				"summary":"CVE-2024-45008",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-45008&packageName=kernel"
			},
			{
				"summary":"CVE-2024-45019",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-45019&packageName=kernel"
			},
			{
				"summary":"CVE-2024-45025",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-45025&packageName=kernel"
			},
			{
				"summary":"CVE-2024-46687",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-46687&packageName=kernel"
			},
			{
				"summary":"CVE-2024-46706",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-46706&packageName=kernel"
			},
			{
				"summary":"CVE-2024-46714",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-46714&packageName=kernel"
			},
			{
				"summary":"CVE-2024-46720",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-46720&packageName=kernel"
			},
			{
				"summary":"CVE-2024-46723",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-46723&packageName=kernel"
			},
			{
				"summary":"CVE-2024-46731",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-46731&packageName=kernel"
			},
			{
				"summary":"CVE-2024-46733",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-46733&packageName=kernel"
			},
			{
				"summary":"CVE-2024-46742",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-46742&packageName=kernel"
			},
			{
				"summary":"CVE-2024-46744",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-46744&packageName=kernel"
			},
			{
				"summary":"CVE-2024-46745",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-46745&packageName=kernel"
			},
			{
				"summary":"CVE-2024-46747",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-46747&packageName=kernel"
			},
			{
				"summary":"CVE-2024-46751",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-46751&packageName=kernel"
			},
			{
				"summary":"CVE-2024-46752",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-46752&packageName=kernel"
			},
			{
				"summary":"CVE-2024-46759",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-46759&packageName=kernel"
			},
			{
				"summary":"CVE-2024-46785",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-46785&packageName=kernel"
			},
			{
				"summary":"CVE-2024-46786",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-46786&packageName=kernel"
			},
			{
				"summary":"CVE-2024-46800",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-46800&packageName=kernel"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-36904"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-41008"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-43904"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-44954"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-44959"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-44962"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-44965"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-44967"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-44969"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-44974"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-44984"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-44991"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-44994"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-44995"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-44996"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-44999"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-45000"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-45002"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-45003"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-45008"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-45019"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-45025"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-46687"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-46706"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-46714"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-46720"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-46723"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-46731"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-46733"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-46742"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-46744"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-46745"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-46747"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-46751"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-46752"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-46759"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-46785"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-46786"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-46800"
			},
			{
				"summary":"openEuler-SA-2024-2181 vex file",
				"category":"self",
				"url":"https://repo.openeuler.org/security/data/csaf/advisories/2024/csaf-openeuler-sa-2024-2181.json"
			}
		],
		"title":"An update for kernel is now available for openEuler-24.03-LTS",
		"tracking":{
			"initial_release_date":"2024-09-27T19:46:56+08:00",
			"revision_history":[
				{
					"date":"2024-09-27T19:46:56+08:00",
					"summary":"Initial",
					"number":"1.0.0"
				}
			],
			"generator":{
				"date":"2024-09-27T19:46:56+08:00",
				"engine":{
					"name":"openEuler CSAF Tool V1.0"
				}
			},
			"current_release_date":"2024-09-27T19:46:56+08:00",
			"id":"openEuler-SA-2024-2181",
			"version":"1.0.0",
			"status":"final"
		}
	},
	"product_tree":{
		"branches":[
			{
				"name":"openEuler",
				"category":"vendor",
				"branches":[
					{
						"name":"openEuler",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"openEuler-24.03-LTS",
									"name":"openEuler-24.03-LTS"
								},
								"name":"openEuler-24.03-LTS",
								"category":"product_version"
							}
						],
						"category":"product_name"
					},
					{
						"name":"aarch64",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"bpftool-6.6.0-44.0.0.50.oe2403.aarch64.rpm",
									"name":"bpftool-6.6.0-44.0.0.50.oe2403.aarch64.rpm"
								},
								"name":"bpftool-6.6.0-44.0.0.50.oe2403.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64.rpm",
									"name":"bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64.rpm"
								},
								"name":"bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-6.6.0-44.0.0.50.oe2403.aarch64.rpm",
									"name":"kernel-6.6.0-44.0.0.50.oe2403.aarch64.rpm"
								},
								"name":"kernel-6.6.0-44.0.0.50.oe2403.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64.rpm",
									"name":"kernel-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64.rpm"
								},
								"name":"kernel-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-debugsource-6.6.0-44.0.0.50.oe2403.aarch64.rpm",
									"name":"kernel-debugsource-6.6.0-44.0.0.50.oe2403.aarch64.rpm"
								},
								"name":"kernel-debugsource-6.6.0-44.0.0.50.oe2403.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-devel-6.6.0-44.0.0.50.oe2403.aarch64.rpm",
									"name":"kernel-devel-6.6.0-44.0.0.50.oe2403.aarch64.rpm"
								},
								"name":"kernel-devel-6.6.0-44.0.0.50.oe2403.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-headers-6.6.0-44.0.0.50.oe2403.aarch64.rpm",
									"name":"kernel-headers-6.6.0-44.0.0.50.oe2403.aarch64.rpm"
								},
								"name":"kernel-headers-6.6.0-44.0.0.50.oe2403.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-source-6.6.0-44.0.0.50.oe2403.aarch64.rpm",
									"name":"kernel-source-6.6.0-44.0.0.50.oe2403.aarch64.rpm"
								},
								"name":"kernel-source-6.6.0-44.0.0.50.oe2403.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-tools-6.6.0-44.0.0.50.oe2403.aarch64.rpm",
									"name":"kernel-tools-6.6.0-44.0.0.50.oe2403.aarch64.rpm"
								},
								"name":"kernel-tools-6.6.0-44.0.0.50.oe2403.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64.rpm",
									"name":"kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64.rpm"
								},
								"name":"kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-tools-devel-6.6.0-44.0.0.50.oe2403.aarch64.rpm",
									"name":"kernel-tools-devel-6.6.0-44.0.0.50.oe2403.aarch64.rpm"
								},
								"name":"kernel-tools-devel-6.6.0-44.0.0.50.oe2403.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"perf-6.6.0-44.0.0.50.oe2403.aarch64.rpm",
									"name":"perf-6.6.0-44.0.0.50.oe2403.aarch64.rpm"
								},
								"name":"perf-6.6.0-44.0.0.50.oe2403.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64.rpm",
									"name":"perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64.rpm"
								},
								"name":"perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"python3-perf-6.6.0-44.0.0.50.oe2403.aarch64.rpm",
									"name":"python3-perf-6.6.0-44.0.0.50.oe2403.aarch64.rpm"
								},
								"name":"python3-perf-6.6.0-44.0.0.50.oe2403.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64.rpm",
									"name":"python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64.rpm"
								},
								"name":"python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64.rpm",
								"category":"product_version"
							}
						],
						"category":"architecture"
					},
					{
						"name":"x86_64",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"bpftool-6.6.0-44.0.0.50.oe2403.x86_64.rpm",
									"name":"bpftool-6.6.0-44.0.0.50.oe2403.x86_64.rpm"
								},
								"name":"bpftool-6.6.0-44.0.0.50.oe2403.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64.rpm",
									"name":"bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64.rpm"
								},
								"name":"bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-6.6.0-44.0.0.50.oe2403.x86_64.rpm",
									"name":"kernel-6.6.0-44.0.0.50.oe2403.x86_64.rpm"
								},
								"name":"kernel-6.6.0-44.0.0.50.oe2403.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64.rpm",
									"name":"kernel-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64.rpm"
								},
								"name":"kernel-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-debugsource-6.6.0-44.0.0.50.oe2403.x86_64.rpm",
									"name":"kernel-debugsource-6.6.0-44.0.0.50.oe2403.x86_64.rpm"
								},
								"name":"kernel-debugsource-6.6.0-44.0.0.50.oe2403.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-devel-6.6.0-44.0.0.50.oe2403.x86_64.rpm",
									"name":"kernel-devel-6.6.0-44.0.0.50.oe2403.x86_64.rpm"
								},
								"name":"kernel-devel-6.6.0-44.0.0.50.oe2403.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-headers-6.6.0-44.0.0.50.oe2403.x86_64.rpm",
									"name":"kernel-headers-6.6.0-44.0.0.50.oe2403.x86_64.rpm"
								},
								"name":"kernel-headers-6.6.0-44.0.0.50.oe2403.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-source-6.6.0-44.0.0.50.oe2403.x86_64.rpm",
									"name":"kernel-source-6.6.0-44.0.0.50.oe2403.x86_64.rpm"
								},
								"name":"kernel-source-6.6.0-44.0.0.50.oe2403.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-tools-6.6.0-44.0.0.50.oe2403.x86_64.rpm",
									"name":"kernel-tools-6.6.0-44.0.0.50.oe2403.x86_64.rpm"
								},
								"name":"kernel-tools-6.6.0-44.0.0.50.oe2403.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64.rpm",
									"name":"kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64.rpm"
								},
								"name":"kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-tools-devel-6.6.0-44.0.0.50.oe2403.x86_64.rpm",
									"name":"kernel-tools-devel-6.6.0-44.0.0.50.oe2403.x86_64.rpm"
								},
								"name":"kernel-tools-devel-6.6.0-44.0.0.50.oe2403.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"perf-6.6.0-44.0.0.50.oe2403.x86_64.rpm",
									"name":"perf-6.6.0-44.0.0.50.oe2403.x86_64.rpm"
								},
								"name":"perf-6.6.0-44.0.0.50.oe2403.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64.rpm",
									"name":"perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64.rpm"
								},
								"name":"perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"python3-perf-6.6.0-44.0.0.50.oe2403.x86_64.rpm",
									"name":"python3-perf-6.6.0-44.0.0.50.oe2403.x86_64.rpm"
								},
								"name":"python3-perf-6.6.0-44.0.0.50.oe2403.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64.rpm",
									"name":"python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64.rpm"
								},
								"name":"python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64.rpm",
								"category":"product_version"
							}
						],
						"category":"architecture"
					},
					{
						"name":"src",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-6.6.0-44.0.0.50.oe2403.src.rpm",
									"name":"kernel-6.6.0-44.0.0.50.oe2403.src.rpm"
								},
								"name":"kernel-6.6.0-44.0.0.50.oe2403.src.rpm",
								"category":"product_version"
							}
						],
						"category":"architecture"
					}
				]
			}
		],
		"relationships":[
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"bpftool-6.6.0-44.0.0.50.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.aarch64",
					"name":"bpftool-6.6.0-44.0.0.50.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"name":"bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-6.6.0-44.0.0.50.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.aarch64",
					"name":"kernel-6.6.0-44.0.0.50.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"name":"kernel-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-debugsource-6.6.0-44.0.0.50.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.aarch64",
					"name":"kernel-debugsource-6.6.0-44.0.0.50.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-devel-6.6.0-44.0.0.50.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.aarch64",
					"name":"kernel-devel-6.6.0-44.0.0.50.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-headers-6.6.0-44.0.0.50.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.aarch64",
					"name":"kernel-headers-6.6.0-44.0.0.50.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-source-6.6.0-44.0.0.50.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.aarch64",
					"name":"kernel-source-6.6.0-44.0.0.50.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-tools-6.6.0-44.0.0.50.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.aarch64",
					"name":"kernel-tools-6.6.0-44.0.0.50.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"name":"kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-tools-devel-6.6.0-44.0.0.50.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.aarch64",
					"name":"kernel-tools-devel-6.6.0-44.0.0.50.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"perf-6.6.0-44.0.0.50.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.aarch64",
					"name":"perf-6.6.0-44.0.0.50.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"name":"perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"python3-perf-6.6.0-44.0.0.50.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.aarch64",
					"name":"python3-perf-6.6.0-44.0.0.50.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"name":"python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"bpftool-6.6.0-44.0.0.50.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.x86_64",
					"name":"bpftool-6.6.0-44.0.0.50.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"name":"bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-6.6.0-44.0.0.50.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.x86_64",
					"name":"kernel-6.6.0-44.0.0.50.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"name":"kernel-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-debugsource-6.6.0-44.0.0.50.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.x86_64",
					"name":"kernel-debugsource-6.6.0-44.0.0.50.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-devel-6.6.0-44.0.0.50.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.x86_64",
					"name":"kernel-devel-6.6.0-44.0.0.50.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-headers-6.6.0-44.0.0.50.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.x86_64",
					"name":"kernel-headers-6.6.0-44.0.0.50.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-source-6.6.0-44.0.0.50.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.x86_64",
					"name":"kernel-source-6.6.0-44.0.0.50.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-tools-6.6.0-44.0.0.50.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.x86_64",
					"name":"kernel-tools-6.6.0-44.0.0.50.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"name":"kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-tools-devel-6.6.0-44.0.0.50.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.x86_64",
					"name":"kernel-tools-devel-6.6.0-44.0.0.50.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"perf-6.6.0-44.0.0.50.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.x86_64",
					"name":"perf-6.6.0-44.0.0.50.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"name":"perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"python3-perf-6.6.0-44.0.0.50.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.x86_64",
					"name":"python3-perf-6.6.0-44.0.0.50.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"name":"python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-6.6.0-44.0.0.50.oe2403.src.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.src",
					"name":"kernel-6.6.0-44.0.0.50.oe2403.src as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			}
		]
	},
	"vulnerabilities":[
		{
			"cve":"CVE-2024-36904",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\ntcp: Use refcount_inc_not_zero() in tcp_twsk_unique().\n\nAnderson Nascimento reported a use-after-free splat in tcp_twsk_unique()\nwith nice analysis.\n\nSince commit ec94c2696f0b (\"tcp/dccp: avoid one atomic operation for\ntimewait hashdance\"), inet_twsk_hashdance() sets TIME-WAIT socket's\nsk_refcnt after putting it into ehash and releasing the bucket lock.\n\nThus, there is a small race window where other threads could try to\nreuse the port during connect() and call sock_hold() in tcp_twsk_unique()\nfor the TIME-WAIT socket with zero refcnt.\n\nIf that happens, the refcnt taken by tcp_twsk_unique() is overwritten\nand sock_put() will cause underflow, triggering a real use-after-free\nsomewhere else.\n\nTo avoid the use-after-free, we need to use refcount_inc_not_zero() in\ntcp_twsk_unique() and give up on reusing the port if it returns false.\n\n[0]:\nrefcount_t: addition on 0; use-after-free.\nWARNING: CPU: 0 PID: 1039313 at lib/refcount.c:25 refcount_warn_saturate+0xe5/0x110\nCPU: 0 PID: 1039313 Comm: trigger Not tainted 6.8.6-200.fc39.x86_64 #1\nHardware name: VMware, Inc. VMware20,1/440BX Desktop Reference Platform, BIOS VMW201.00V.21805430.B64.2305221830 05/22/2023\nRIP: 0010:refcount_warn_saturate+0xe5/0x110\nCode: 42 8e ff 0f 0b c3 cc cc cc cc 80 3d aa 13 ea 01 00 0f 85 5e ff ff ff 48 c7 c7 f8 8e b7 82 c6 05 96 13 ea 01 01 e8 7b 42 8e ff <0f> 0b c3 cc cc cc cc 48 c7 c7 50 8f b7 82 c6 05 7a 13 ea 01 01 e8\nRSP: 0018:ffffc90006b43b60 EFLAGS: 00010282\nRAX: 0000000000000000 RBX: ffff888009bb3ef0 RCX: 0000000000000027\nRDX: ffff88807be218c8 RSI: 0000000000000001 RDI: ffff88807be218c0\nRBP: 0000000000069d70 R08: 0000000000000000 R09: ffffc90006b439f0\nR10: ffffc90006b439e8 R11: 0000000000000003 R12: ffff8880029ede84\nR13: 0000000000004e20 R14: ffffffff84356dc0 R15: ffff888009bb3ef0\nFS:  00007f62c10926c0(0000) GS:ffff88807be00000(0000) knlGS:0000000000000000\nCS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000000020ccb000 CR3: 000000004628c005 CR4: 0000000000f70ef0\nPKRU: 55555554\nCall Trace:\n <TASK>\n ? refcount_warn_saturate+0xe5/0x110\n ? __warn+0x81/0x130\n ? refcount_warn_saturate+0xe5/0x110\n ? report_bug+0x171/0x1a0\n ? refcount_warn_saturate+0xe5/0x110\n ? handle_bug+0x3c/0x80\n ? exc_invalid_op+0x17/0x70\n ? asm_exc_invalid_op+0x1a/0x20\n ? refcount_warn_saturate+0xe5/0x110\n tcp_twsk_unique+0x186/0x190\n __inet_check_established+0x176/0x2d0\n __inet_hash_connect+0x74/0x7d0\n ? __pfx___inet_check_established+0x10/0x10\n tcp_v4_connect+0x278/0x530\n __inet_stream_connect+0x10f/0x3d0\n inet_stream_connect+0x3a/0x60\n __sys_connect+0xa8/0xd0\n __x64_sys_connect+0x18/0x20\n do_syscall_64+0x83/0x170\n entry_SYSCALL_64_after_hwframe+0x78/0x80\nRIP: 0033:0x7f62c11a885d\nCode: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d a3 45 0c 00 f7 d8 64 89 01 48\nRSP: 002b:00007f62c1091e58 EFLAGS: 00000296 ORIG_RAX: 000000000000002a\nRAX: ffffffffffffffda RBX: 0000000020ccb004 RCX: 00007f62c11a885d\nRDX: 0000000000000010 RSI: 0000000020ccb000 RDI: 0000000000000003\nRBP: 00007f62c1091e90 R08: 0000000000000000 R09: 0000000000000000\nR10: 0000000000000000 R11: 0000000000000296 R12: 00007f62c10926c0\nR13: ffffffffffffff88 R14: 0000000000000000 R15: 00007ffe237885b0\n </TASK>",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2181"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.0,
						"vectorString":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2024-36904"
		},
		{
			"cve":"CVE-2024-41008",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amdgpu: change vm->task_info handling\n\nThis patch changes the handling and lifecycle of vm->task_info object.\nThe major changes are:\n- vm->task_info is a dynamically allocated ptr now, and its uasge is\n  reference counted.\n- introducing two new helper funcs for task_info lifecycle management\n    - amdgpu_vm_get_task_info: reference counts up task_info before\n      returning this info\n    - amdgpu_vm_put_task_info: reference counts down task_info\n- last put to task_info() frees task_info from the vm.\n\nThis patch also does logistical changes required for existing usage\nof vm->task_info.\n\nV2: Do not block all the prints when task_info not found (Felix)\n\nV3: Fixed review comments from Felix\n   - Fix wrong indentation\n   - No debug message for -ENOMEM\n   - Add NULL check for task_info\n   - Do not duplicate the debug messages (ti vs no ti)\n   - Get first reference of task_info in vm_init(), put last\n     in vm_fini()\n\nV4: Fixed review comments from Felix\n   - fix double reference increment in create_task_info\n   - change amdgpu_vm_get_task_info_pasid\n   - additional changes in amdgpu_gem.c while porting",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2181"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":4.4,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-41008"
		},
		{
			"cve":"CVE-2024-43904",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:drm/amd/display: Add null checks for  stream  and  plane  before dereferencingThis commit adds null checks for the  stream  and  plane  variables inthe dcn30_apply_idle_power_optimizations function. These variables werepreviously assumed to be null at line 922, but they were used later inthe code without checking if they were null. This could potentially leadto a null pointer dereference, which would cause a crash.The null checks ensure that  stream  and  plane  are not null beforethey are used, preventing potential crashes.Fixes the below static smatch checker:drivers/gpu/drm/amd/amdgpu/../display/dc/hwss/dcn30/dcn30_hwseq.c:938 dcn30_apply_idle_power_optimizations() error: we previously assumed  stream  could be null (see line 922)drivers/gpu/drm/amd/amdgpu/../display/dc/hwss/dcn30/dcn30_hwseq.c:940 dcn30_apply_idle_power_optimizations() error: we previously assumed  plane  could be null (see line 922)",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2181"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-43904"
		},
		{
			"cve":"CVE-2024-44954",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: line6: Fix racy access to midibuf\n\nThere can be concurrent accesses to line6 midibuf from both the URB\ncompletion callback and the rawmidi API access.  This could be a cause\nof KMSAN warning triggered by syzkaller below (so put as reported-by\nhere).\n\nThis patch protects the midibuf call of the former code path with a\nspinlock for avoiding the possible races.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2181"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"LOW",
						"baseScore":3.9,
						"vectorString":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Low",
					"category":"impact"
				}
			],
			"title":"CVE-2024-44954"
		},
		{
			"cve":"CVE-2024-44959",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\ntracefs: Use generic inode RCU for synchronizing freeing\n\nWith structure layout randomization enabled for 'struct inode' we need to\navoid overlapping any of the RCU-used / initialized-only-once members,\ne.g. i_lru or i_sb_list to not corrupt related list traversals when making\nuse of the rcu_head.\n\nFor an unlucky structure layout of 'struct inode' we may end up with the\nfollowing splat when running the ftrace selftests:\n\n[<...>] list_del corruption, ffff888103ee2cb0->next (tracefs_inode_cache+0x0/0x4e0 [slab object]) is NULL (prev is tracefs_inode_cache+0x78/0x4e0 [slab object])\n[<...>] ------------[ cut here ]------------\n[<...>] kernel BUG at lib/list_debug.c:54!\n[<...>] invalid opcode: 0000 [#1] PREEMPT SMP KASAN\n[<...>] CPU: 3 PID: 2550 Comm: mount Tainted: G                 N  6.8.12-grsec+ #122 ed2f536ca62f28b087b90e3cc906a8d25b3ddc65\n[<...>] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.14.0-2 04/01/2014\n[<...>] RIP: 0010:[<ffffffff84656018>] __list_del_entry_valid_or_report+0x138/0x3e0\n[<...>] Code: 48 b8 99 fb 65 f2 ff ff ff ff e9 03 5c d9 fc cc 48 b8 99 fb 65 f2 ff ff ff ff e9 33 5a d9 fc cc 48 b8 99 fb 65 f2 ff ff ff ff <0f> 0b 4c 89 e9 48 89 ea 48 89 ee 48 c7 c7 60 8f dd 89 31 c0 e8 2f\n[<...>] RSP: 0018:fffffe80416afaf0 EFLAGS: 00010283\n[<...>] RAX: 0000000000000098 RBX: ffff888103ee2cb0 RCX: 0000000000000000\n[<...>] RDX: ffffffff84655fe8 RSI: ffffffff89dd8b60 RDI: 0000000000000001\n[<...>] RBP: ffff888103ee2cb0 R08: 0000000000000001 R09: fffffbd0082d5f25\n[<...>] R10: fffffe80416af92f R11: 0000000000000001 R12: fdf99c16731d9b6d\n[<...>] R13: 0000000000000000 R14: ffff88819ad4b8b8 R15: 0000000000000000\n[<...>] RBX: tracefs_inode_cache+0x0/0x4e0 [slab object]\n[<...>] RDX: __list_del_entry_valid_or_report+0x108/0x3e0\n[<...>] RSI: __func__.47+0x4340/0x4400\n[<...>] RBP: tracefs_inode_cache+0x0/0x4e0 [slab object]\n[<...>] RSP: process kstack fffffe80416afaf0+0x7af0/0x8000 [mount 2550 2550]\n[<...>] R09: kasan shadow of process kstack fffffe80416af928+0x7928/0x8000 [mount 2550 2550]\n[<...>] R10: process kstack fffffe80416af92f+0x792f/0x8000 [mount 2550 2550]\n[<...>] R14: tracefs_inode_cache+0x78/0x4e0 [slab object]\n[<...>] FS:  00006dcb380c1840(0000) GS:ffff8881e0600000(0000) knlGS:0000000000000000\n[<...>] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[<...>] CR2: 000076ab72b30e84 CR3: 000000000b088004 CR4: 0000000000360ef0 shadow CR4: 0000000000360ef0\n[<...>] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n[<...>] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n[<...>] ASID: 0003\n[<...>] Stack:\n[<...>]  ffffffff818a2315 00000000f5c856ee ffffffff896f1840 ffff888103ee2cb0\n[<...>]  ffff88812b6b9750 0000000079d714b6 fffffbfff1e9280b ffffffff8f49405f\n[<...>]  0000000000000001 0000000000000000 ffff888104457280 ffffffff8248b392\n[<...>] Call Trace:\n[<...>]  <TASK>\n[<...>]  [<ffffffff818a2315>] ? lock_release+0x175/0x380 fffffe80416afaf0\n[<...>]  [<ffffffff8248b392>] list_lru_del+0x152/0x740 fffffe80416afb48\n[<...>]  [<ffffffff8248ba93>] list_lru_del_obj+0x113/0x280 fffffe80416afb88\n[<...>]  [<ffffffff8940fd19>] ? _atomic_dec_and_lock+0x119/0x200 fffffe80416afb90\n[<...>]  [<ffffffff8295b244>] iput_final+0x1c4/0x9a0 fffffe80416afbb8\n[<...>]  [<ffffffff8293a52b>] dentry_unlink_inode+0x44b/0xaa0 fffffe80416afbf8\n[<...>]  [<ffffffff8293fefc>] __dentry_kill+0x23c/0xf00 fffffe80416afc40\n[<...>]  [<ffffffff8953a85f>] ? __this_cpu_preempt_check+0x1f/0xa0 fffffe80416afc48\n[<...>]  [<ffffffff82949ce5>] ? shrink_dentry_list+0x1c5/0x760 fffffe80416afc70\n[<...>]  [<ffffffff82949b71>] ? shrink_dentry_list+0x51/0x760 fffffe80416afc78\n[<...>]  [<ffffffff82949da8>] shrink_dentry_list+0x288/0x760 fffffe80416afc80\n[<...>]  [<ffffffff8294ae75>] shrink_dcache_sb+0x155/0x420 fffffe80416afcc8\n[<...>]  [<ffffffff8953a7c3>] ? debug_smp_processor_id+0x23/0xa0 fffffe80416afce0\n[<...>]  [<ffffffff8294ad20>] ? do_one_tre\n---truncated---",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2181"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"LOW",
						"baseScore":3.9,
						"vectorString":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Low",
					"category":"impact"
				}
			],
			"title":"CVE-2024-44959"
		},
		{
			"cve":"CVE-2024-44962",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: btnxpuart: Shutdown timer and prevent rearming when driver unloading\n\nWhen unload the btnxpuart driver, its associated timer will be deleted.\nIf the timer happens to be modified at this moment, it leads to the\nkernel call this timer even after the driver unloaded, resulting in\nkernel panic.\nUse timer_shutdown_sync() instead of del_timer_sync() to prevent rearming.\n\npanic log:\n  Internal error: Oops: 0000000086000007 [#1] PREEMPT SMP\n  Modules linked in: algif_hash algif_skcipher af_alg moal(O) mlan(O) crct10dif_ce polyval_ce polyval_generic   snd_soc_imx_card snd_soc_fsl_asoc_card snd_soc_imx_audmux mxc_jpeg_encdec v4l2_jpeg snd_soc_wm8962 snd_soc_fsl_micfil   snd_soc_fsl_sai flexcan snd_soc_fsl_utils ap130x rpmsg_ctrl imx_pcm_dma can_dev rpmsg_char pwm_fan fuse [last unloaded:   btnxpuart]\n  CPU: 5 PID: 723 Comm: memtester Tainted: G           O       6.6.23-lts-next-06207-g4aef2658ac28 #1\n  Hardware name: NXP i.MX95 19X19 board (DT)\n  pstate: 20400009 (nzCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n  pc : 0xffff80007a2cf464\n  lr : call_timer_fn.isra.0+0x24/0x80\n...\n  Call trace:\n   0xffff80007a2cf464\n   __run_timers+0x234/0x280\n   run_timer_softirq+0x20/0x40\n   __do_softirq+0x100/0x26c\n   ____do_softirq+0x10/0x1c\n   call_on_irq_stack+0x24/0x4c\n   do_softirq_own_stack+0x1c/0x2c\n   irq_exit_rcu+0xc0/0xdc\n   el0_interrupt+0x54/0xd8\n   __el0_irq_handler_common+0x18/0x24\n   el0t_64_irq_handler+0x10/0x1c\n   el0t_64_irq+0x190/0x194\n  Code: ???????? ???????? ???????? ???????? (????????)\n  ---[ end trace 0000000000000000 ]---\n  Kernel panic - not syncing: Oops: Fatal exception in interrupt\n  SMP: stopping secondary CPUs\n  Kernel Offset: disabled\n  CPU features: 0x0,c0000000,40028143,1000721b\n  Memory Limit: none\n  ---[ end Kernel panic - not syncing: Oops: Fatal exception in interrupt ]---",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2181"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"LOW",
						"baseScore":3.9,
						"vectorString":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Low",
					"category":"impact"
				}
			],
			"title":"CVE-2024-44962"
		},
		{
			"cve":"CVE-2024-44965",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nx86/mm: Fix pti_clone_pgtable() alignment assumption\n\nGuenter reported dodgy crashes on an i386-nosmp build using GCC-11\nthat had the form of endless traps until entry stack exhaust and then\n#DF from the stack guard.\n\nIt turned out that pti_clone_pgtable() had alignment assumptions on\nthe start address, notably it hard assumes start is PMD aligned. This\nis true on x86_64, but very much not true on i386.\n\nThese assumptions can cause the end condition to malfunction, leading\nto a 'short' clone. Guess what happens when the user mapping has a\nshort copy of the entry text?\n\nUse the correct increment form for addr to avoid alignment\nassumptions.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2181"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-44965"
		},
		{
			"cve":"CVE-2024-44967",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/mgag200: Bind I2C lifetime to DRM device\n\nManaged cleanup with devm_add_action_or_reset() will release the I2C\nadapter when the underlying Linux device goes away. But the connector\nstill refers to it, so this cleanup leaves behind a stale pointer\nin struct drm_connector.ddc.\n\nBind the lifetime of the I2C adapter to the connector's lifetime by\nusing DRM's managed release. When the DRM device goes away (after\nthe Linux device) DRM will first clean up the connector and then\nclean up the I2C adapter.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2181"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"LOW",
						"baseScore":3.9,
						"vectorString":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Low",
					"category":"impact"
				}
			],
			"title":"CVE-2024-44967"
		},
		{
			"cve":"CVE-2024-44969",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\ns390/sclp: Prevent release of buffer in I/O\n\nWhen a task waiting for completion of a Store Data operation is\ninterrupted, an attempt is made to halt this operation. If this attempt\nfails due to a hardware or firmware problem, there is a chance that the\nSCLP facility might store data into buffers referenced by the original\noperation at a later time.\n\nHandle this situation by not releasing the referenced data buffers if\nthe halt attempt fails. For current use cases, this might result in a\nleak of few pages of memory in case of a rare hardware/firmware\nmalfunction.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2181"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"LOW",
						"baseScore":3.9,
						"vectorString":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Low",
					"category":"impact"
				}
			],
			"title":"CVE-2024-44969"
		},
		{
			"cve":"CVE-2024-44974",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:mptcp: pm: avoid possible UaF when selecting endpselect_local_address() and select_signal_address() both select anendpoint entry from the list inside an RCU protected section, but returna reference to it, to be read later on. If the entry is dereferencedafter the RCU unlock, reading info could cause a Use-after-Free.A simple solution is to copy the required info while inside the RCUprotected section to avoid any risk of UaF later. The address ID mightneed to be modified later to handle the ID0 case later, so a copy seemsOK to deal with.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2181"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.8,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2024-44974"
		},
		{
			"cve":"CVE-2024-44984",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nbnxt_en: Fix double DMA unmapping for XDP_REDIRECT\n\nRemove the dma_unmap_page_attrs() call in the driver's XDP_REDIRECT\ncode path.  This should have been removed when we let the page pool\nhandle the DMA mapping.  This bug causes the warning:\n\nWARNING: CPU: 7 PID: 59 at drivers/iommu/dma-iommu.c:1198 iommu_dma_unmap_page+0xd5/0x100\nCPU: 7 PID: 59 Comm: ksoftirqd/7 Tainted: G        W          6.8.0-1010-gcp #11-Ubuntu\nHardware name: Dell Inc. PowerEdge R7525/0PYVT1, BIOS 2.15.2 04/02/2024\nRIP: 0010:iommu_dma_unmap_page+0xd5/0x100\nCode: 89 ee 48 89 df e8 cb f2 69 ff 48 83 c4 08 5b 41 5c 41 5d 41 5e 41 5f 5d 31 c0 31 d2 31 c9 31 f6 31 ff 45 31 c0 e9 ab 17 71 00 <0f> 0b 48 83 c4 08 5b 41 5c 41 5d 41 5e 41 5f 5d 31 c0 31 d2 31 c9\nRSP: 0018:ffffab1fc0597a48 EFLAGS: 00010246\nRAX: 0000000000000000 RBX: ffff99ff838280c8 RCX: 0000000000000000\nRDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000\nRBP: ffffab1fc0597a78 R08: 0000000000000002 R09: ffffab1fc0597c1c\nR10: ffffab1fc0597cd3 R11: ffff99ffe375acd8 R12: 00000000e65b9000\nR13: 0000000000000050 R14: 0000000000001000 R15: 0000000000000002\nFS:  0000000000000000(0000) GS:ffff9a06efb80000(0000) knlGS:0000000000000000\nCS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000565c34c37210 CR3: 00000005c7e3e000 CR4: 0000000000350ef0\n? show_regs+0x6d/0x80\n? __warn+0x89/0x150\n? iommu_dma_unmap_page+0xd5/0x100\n? report_bug+0x16a/0x190\n? handle_bug+0x51/0xa0\n? exc_invalid_op+0x18/0x80\n? iommu_dma_unmap_page+0xd5/0x100\n? iommu_dma_unmap_page+0x35/0x100\ndma_unmap_page_attrs+0x55/0x220\n? bpf_prog_4d7e87c0d30db711_xdp_dispatcher+0x64/0x9f\nbnxt_rx_xdp+0x237/0x520 [bnxt_en]\nbnxt_rx_pkt+0x640/0xdd0 [bnxt_en]\n__bnxt_poll_work+0x1a1/0x3d0 [bnxt_en]\nbnxt_poll+0xaa/0x1e0 [bnxt_en]\n__napi_poll+0x33/0x1e0\nnet_rx_action+0x18a/0x2f0",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2181"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"LOW",
						"baseScore":3.3,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Low",
					"category":"impact"
				}
			],
			"title":"CVE-2024-44984"
		},
		{
			"cve":"CVE-2024-44991",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\ntcp: prevent concurrent execution of tcp_sk_exit_batch\n\nIts possible that two threads call tcp_sk_exit_batch() concurrently,\nonce from the cleanup_net workqueue, once from a task that failed to clone\na new netns.  In the latter case, error unwinding calls the exit handlers\nin reverse order for the 'failed' netns.\n\ntcp_sk_exit_batch() calls tcp_twsk_purge().\nProblem is that since commit b099ce2602d8 (\"net: Batch inet_twsk_purge\"),\nthis function picks up twsk in any dying netns, not just the one passed\nin via exit_batch list.\n\nThis means that the error unwind of setup_net() can \"steal\" and destroy\ntimewait sockets belonging to the exiting netns.\n\nThis allows the netns exit worker to proceed to call\n\nWARN_ON_ONCE(!refcount_dec_and_test(&net->ipv4.tcp_death_row.tw_refcount));\n\nwithout the expected 1 -> 0 transition, which then splats.\n\nAt same time, error unwind path that is also running inet_twsk_purge()\nwill splat as well:\n\nWARNING: .. at lib/refcount.c:31 refcount_warn_saturate+0x1ed/0x210\n...\n refcount_dec include/linux/refcount.h:351 [inline]\n inet_twsk_kill+0x758/0x9c0 net/ipv4/inet_timewait_sock.c:70\n inet_twsk_deschedule_put net/ipv4/inet_timewait_sock.c:221\n inet_twsk_purge+0x725/0x890 net/ipv4/inet_timewait_sock.c:304\n tcp_sk_exit_batch+0x1c/0x170 net/ipv4/tcp_ipv4.c:3522\n ops_exit_list+0x128/0x180 net/core/net_namespace.c:178\n setup_net+0x714/0xb40 net/core/net_namespace.c:375\n copy_net_ns+0x2f0/0x670 net/core/net_namespace.c:508\n create_new_namespaces+0x3ea/0xb10 kernel/nsproxy.c:110\n\n... because refcount_dec() of tw_refcount unexpectedly dropped to 0.\n\nThis doesn't seem like an actual bug (no tw sockets got lost and I don't\nsee a use-after-free) but as erroneous trigger of debug check.\n\nAdd a mutex to force strict ordering: the task that calls tcp_twsk_purge()\nblocks other task from doing final _dec_and_test before mutex-owner has\nremoved all tw sockets of dying netns.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2181"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-44991"
		},
		{
			"cve":"CVE-2024-44994",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\niommu: Restore lost return in iommu_report_device_fault()\n\nWhen iommu_report_device_fault gets called with a partial fault it is\nsupposed to collect the fault into the group and then return.\n\nInstead the return was accidently deleted which results in trying to\nprocess the fault and an eventual crash.\n\nDeleting the return was a typo, put it back.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2181"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-44994"
		},
		{
			"cve":"CVE-2024-44995",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nnet: hns3: fix a deadlock problem when config TC during resetting\n\nWhen config TC during the reset process, may cause a deadlock, the flow is\nas below:\n                             pf reset start\n                                 │\n                                 ▼\n                              ......\nsetup tc                         │\n    │                            ▼\n    ▼                      DOWN: napi_disable()\nnapi_disable()(skip)             │\n    │                            │\n    ▼                            ▼\n  ......                      ......\n    │                            │\n    ▼                            │\nnapi_enable()                    │\n                                 ▼\n                           UINIT: netif_napi_del()\n                                 │\n                                 ▼\n                              ......\n                                 │\n                                 ▼\n                           INIT: netif_napi_add()\n                                 │\n                                 ▼\n                              ......                 global reset start\n                                 │                      │\n                                 ▼                      ▼\n                           UP: napi_enable()(skip)    ......\n                                 │                      │\n                                 ▼                      ▼\n                              ......                 napi_disable()\n\nIn reset process, the driver will DOWN the port and then UINIT, in this\ncase, the setup tc process will UP the port before UINIT, so cause the\nproblem. Adds a DOWN process in UINIT to fix it.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2181"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"",
					"category":"impact"
				}
			],
			"title":"CVE-2024-44995"
		},
		{
			"cve":"CVE-2024-44996",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:vsock: fix recursive ->recvmsg callsAfter a vsock socket has been added to a BPF sockmap, its prot->recvmsghas been replaced with vsock_bpf_recvmsg(). Thus the followingrecursiion could happen:vsock_bpf_recvmsg() -> __vsock_recvmsg()  -> vsock_connectible_recvmsg()   -> prot->recvmsg()    -> vsock_bpf_recvmsg() againWe need to fix it by calling the original ->recvmsg() without any BPFsockmap logic in __vsock_recvmsg().",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2181"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-44996"
		},
		{
			"cve":"CVE-2024-44999",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:gtp: pull network headers in gtp_dev_xmit()syzbot/KMSAN reported use of uninit-value in get_dev_xmit() [1]We must make sure the IPv4 or Ipv6 header is pulled in skb->headbefore accessing fields in them.Use pskb_inet_may_pull() to fix this issue.[1]BUG: KMSAN: uninit-value in ipv6_pdp_find drivers/net/gtp.c:220 [inline] BUG: KMSAN: uninit-value in gtp_build_skb_ip6 drivers/net/gtp.c:1229 [inline] BUG: KMSAN: uninit-value in gtp_dev_xmit+0x1424/0x2540 drivers/net/gtp.c:1281  ipv6_pdp_find drivers/net/gtp.c:220 [inline]  gtp_build_skb_ip6 drivers/net/gtp.c:1229 [inline]  gtp_dev_xmit+0x1424/0x2540 drivers/net/gtp.c:1281  __netdev_start_xmit include/linux/netdevice.h:4913 [inline]  netdev_start_xmit include/linux/netdevice.h:4922 [inline]  xmit_one net/core/dev.c:3580 [inline]  dev_hard_start_xmit+0x247/0xa20 net/core/dev.c:3596  __dev_queue_xmit+0x358c/0x5610 net/core/dev.c:4423  dev_queue_xmit include/linux/netdevice.h:3105 [inline]  packet_xmit+0x9c/0x6c0 net/packet/af_packet.c:276  packet_snd net/packet/af_packet.c:3145 [inline]  packet_sendmsg+0x90e3/0xa3a0 net/packet/af_packet.c:3177  sock_sendmsg_nosec net/socket.c:730 [inline]  __sock_sendmsg+0x30f/0x380 net/socket.c:745  __sys_sendto+0x685/0x830 net/socket.c:2204  __do_sys_sendto net/socket.c:2216 [inline]  __se_sys_sendto net/socket.c:2212 [inline]  __x64_sys_sendto+0x125/0x1d0 net/socket.c:2212  x64_sys_call+0x3799/0x3c10 arch/x86/include/generated/asm/syscalls_64.h:45  do_syscall_x64 arch/x86/entry/common.c:52 [inline]  do_syscall_64+0xcd/0x1e0 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7fUninit was created at:  slab_post_alloc_hook mm/slub.c:3994 [inline]  slab_alloc_node mm/slub.c:4037 [inline]  kmem_cache_alloc_node_noprof+0x6bf/0xb80 mm/slub.c:4080  kmalloc_reserve+0x13d/0x4a0 net/core/skbuff.c:583  __alloc_skb+0x363/0x7b0 net/core/skbuff.c:674  alloc_skb include/linux/skbuff.h:1320 [inline]  alloc_skb_with_frags+0xc8/0xbf0 net/core/skbuff.c:6526  sock_alloc_send_pskb+0xa81/0xbf0 net/core/sock.c:2815  packet_alloc_skb net/packet/af_packet.c:2994 [inline]  packet_snd net/packet/af_packet.c:3088 [inline]  packet_sendmsg+0x749c/0xa3a0 net/packet/af_packet.c:3177  sock_sendmsg_nosec net/socket.c:730 [inline]  __sock_sendmsg+0x30f/0x380 net/socket.c:745  __sys_sendto+0x685/0x830 net/socket.c:2204  __do_sys_sendto net/socket.c:2216 [inline]  __se_sys_sendto net/socket.c:2212 [inline]  __x64_sys_sendto+0x125/0x1d0 net/socket.c:2212  x64_sys_call+0x3799/0x3c10 arch/x86/include/generated/asm/syscalls_64.h:45  do_syscall_x64 arch/x86/entry/common.c:52 [inline]  do_syscall_64+0xcd/0x1e0 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7fCPU: 0 UID: 0 PID: 7115 Comm: syz.1.515 Not tainted 6.11.0-rc1-syzkaller-00043-g94ede2a3e913 #0Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2181"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"LOW",
						"baseScore":3.9,
						"vectorString":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Low",
					"category":"impact"
				}
			],
			"title":"CVE-2024-44999"
		},
		{
			"cve":"CVE-2024-45000",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:fs/netfs/fscache_cookie: add missing  n_accesses  checkThis fixes a NULL pointer dereference bug due to a data race whichlooks like this:  BUG: kernel NULL pointer dereference, address: 0000000000000008  #PF: supervisor read access in kernel mode  #PF: error_code(0x0000) - not-present page  PGD 0 P4D 0  Oops: 0000 [#1] SMP PTI  CPU: 33 PID: 16573 Comm: kworker/u97:799 Not tainted 6.8.7-cm4all1-hp+ #43  Hardware name: HP ProLiant DL380 Gen9/ProLiant DL380 Gen9, BIOS P89 10/17/2018  Workqueue: events_unbound netfs_rreq_write_to_cache_work  RIP: 0010:cachefiles_prepare_write+0x30/0xa0  Code: 57 41 56 45 89 ce 41 55 49 89 cd 41 54 49 89 d4 55 53 48 89 fb 48 83 ec 08 48 8b 47 08 48 83 7f 10 00 48 89 34 24 48 8b 68 20 <48> 8b 45 08 4c 8b 38 74 45 49 8b 7f 50 e8 4e a9 b0 ff 48 8b 73 10  RSP: 0018:ffffb4e78113bde0 EFLAGS: 00010286  RAX: ffff976126be6d10 RBX: ffff97615cdb8438 RCX: 0000000000020000  RDX: ffff97605e6c4c68 RSI: ffff97605e6c4c60 RDI: ffff97615cdb8438  RBP: 0000000000000000 R08: 0000000000278333 R09: 0000000000000001  R10: ffff97605e6c4600 R11: 0000000000000001 R12: ffff97605e6c4c68  R13: 0000000000020000 R14: 0000000000000001 R15: ffff976064fe2c00  FS:  0000000000000000(0000) GS:ffff9776dfd40000(0000) knlGS:0000000000000000  CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033  CR2: 0000000000000008 CR3: 000000005942c002 CR4: 00000000001706f0  Call Trace:   <TASK>   ? __die+0x1f/0x70   ? page_fault_oops+0x15d/0x440   ? search_module_extables+0xe/0x40   ? fixup_exception+0x22/0x2f0   ? exc_page_fault+0x5f/0x100   ? asm_exc_page_fault+0x22/0x30   ? cachefiles_prepare_write+0x30/0xa0   netfs_rreq_write_to_cache_work+0x135/0x2e0   process_one_work+0x137/0x2c0   worker_thread+0x2e9/0x400   ? __pfx_worker_thread+0x10/0x10   kthread+0xcc/0x100   ? __pfx_kthread+0x10/0x10   ret_from_fork+0x30/0x50   ? __pfx_kthread+0x10/0x10   ret_from_fork_asm+0x1b/0x30   </TASK>  Modules linked in:  CR2: 0000000000000008  ---[ end trace 0000000000000000 ]---This happened because fscache_cookie_state_machine() was slow and wasstill running while another process invoked fscache_unuse_cookie();this led to a fscache_cookie_lru_do_one() call, setting theFSCACHE_COOKIE_DO_LRU_DISCARD flag, which was picked up byfscache_cookie_state_machine(), withdrawing the cookie viacachefiles_withdraw_cookie(), clearing cookie->cache_priv.At the same time, yet another process invokedcachefiles_prepare_write(), which found a NULL pointer in this codeline:  struct cachefiles_object *object = cachefiles_cres_object(cres);The next line crashes, obviously:  struct cachefiles_cache *cache = object->volume->cache;During cachefiles_prepare_write(), the  n_accesses  counter isnon-zero (via fscache_begin_operation()).  The cookie must not bewithdrawn until it drops to zero.The counter is checked by fscache_cookie_state_machine() beforeswitching to FSCACHE_COOKIE_STATE_RELINQUISHING andFSCACHE_COOKIE_STATE_WITHDRAWING (in  caseFSCACHE_COOKIE_STATE_FAILED ), but not forFSCACHE_COOKIE_STATE_LRU_DISCARDING ( caseFSCACHE_COOKIE_STATE_ACTIVE ).This patch adds the missing check.  With a non-zero access counter,the function returns and the next fscache_end_cookie_access() callwill queue another fscache_cookie_state_machine() call to handle thestill-pending FSCACHE_COOKIE_DO_LRU_DISCARD.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2181"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-45000"
		},
		{
			"cve":"CVE-2024-45002",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:rtla/osnoise: Prevent NULL dereference in error handlingIf the  tool->data  allocation fails then there is no need to callosnoise_free_top() and, in fact, doing so will lead to a NULL dereference.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2181"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-45002"
		},
		{
			"cve":"CVE-2024-45003",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nvfs: Don't evict inode under the inode lru traversing context\n\nThe inode reclaiming process(See function prune_icache_sb) collects all\nreclaimable inodes and mark them with I_FREEING flag at first, at that\ntime, other processes will be stuck if they try getting these inodes\n(See function find_inode_fast), then the reclaiming process destroy the\ninodes by function dispose_list(). Some filesystems(eg. ext4 with\nea_inode feature, ubifs with xattr) may do inode lookup in the inode\nevicting callback function, if the inode lookup is operated under the\ninode lru traversing context, deadlock problems may happen.\n\nCase 1: In function ext4_evict_inode(), the ea inode lookup could happen\n        if ea_inode feature is enabled, the lookup process will be stuck\n\tunder the evicting context like this:\n\n 1. File A has inode i_reg and an ea inode i_ea\n 2. getfattr(A, xattr_buf) // i_ea is added into lru // lru->i_ea\n 3. Then, following three processes running like this:\n\n    PA                              PB\n echo 2 > /proc/sys/vm/drop_caches\n  shrink_slab\n   prune_dcache_sb\n   // i_reg is added into lru, lru->i_ea->i_reg\n   prune_icache_sb\n    list_lru_walk_one\n     inode_lru_isolate\n      i_ea->i_state |= I_FREEING // set inode state\n     inode_lru_isolate\n      __iget(i_reg)\n      spin_unlock(&i_reg->i_lock)\n      spin_unlock(lru_lock)\n                                     rm file A\n                                      i_reg->nlink = 0\n      iput(i_reg) // i_reg->nlink is 0, do evict\n       ext4_evict_inode\n        ext4_xattr_delete_inode\n         ext4_xattr_inode_dec_ref_all\n          ext4_xattr_inode_iget\n           ext4_iget(i_ea->i_ino)\n            iget_locked\n             find_inode_fast\n              __wait_on_freeing_inode(i_ea) ----→ AA deadlock\n    dispose_list // cannot be executed by prune_icache_sb\n     wake_up_bit(&i_ea->i_state)\n\nCase 2: In deleted inode writing function ubifs_jnl_write_inode(), file\n        deleting process holds BASEHD's wbuf->io_mutex while getting the\n\txattr inode, which could race with inode reclaiming process(The\n        reclaiming process could try locking BASEHD's wbuf->io_mutex in\n\tinode evicting function), then an ABBA deadlock problem would\n\thappen as following:\n\n 1. File A has inode ia and a xattr(with inode ixa), regular file B has\n    inode ib and a xattr.\n 2. getfattr(A, xattr_buf) // ixa is added into lru // lru->ixa\n 3. Then, following three processes running like this:\n\n        PA                PB                        PC\n                echo 2 > /proc/sys/vm/drop_caches\n                 shrink_slab\n                  prune_dcache_sb\n                  // ib and ia are added into lru, lru->ixa->ib->ia\n                  prune_icache_sb\n                   list_lru_walk_one\n                    inode_lru_isolate\n                     ixa->i_state |= I_FREEING // set inode state\n                    inode_lru_isolate\n                     __iget(ib)\n                     spin_unlock(&ib->i_lock)\n                     spin_unlock(lru_lock)\n                                                   rm file B\n                                                    ib->nlink = 0\n rm file A\n  iput(ia)\n   ubifs_evict_inode(ia)\n    ubifs_jnl_delete_inode(ia)\n     ubifs_jnl_write_inode(ia)\n      make_reservation(BASEHD) // Lock wbuf->io_mutex\n      ubifs_iget(ixa->i_ino)\n       iget_locked\n        find_inode_fast\n         __wait_on_freeing_inode(ixa)\n          |          iput(ib) // ib->nlink is 0, do evict\n          |           ubifs_evict_inode\n          |            ubifs_jnl_delete_inode(ib)\n          ↓             ubifs_jnl_write_inode\n     ABBA deadlock ←-----make_reservation(BASEHD)\n                   dispose_list // cannot be executed by prune_icache_sb\n                    wake_up_bit(&ixa->i_state)\n\nFix the possible deadlock by using new inode state flag I_LRU_ISOLATING\nto pin the inode in memory while inode_lru_isolate(\n---truncated---",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2181"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"",
						"baseScore":3.9,
						"vectorString":"CVSS:3.1/",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"",
					"category":"impact"
				}
			],
			"title":"CVE-2024-45003"
		},
		{
			"cve":"CVE-2024-45008",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nInput: MT - limit max slots\n\nsyzbot is reporting too large allocation at input_mt_init_slots(), for\nnum_slots is supplied from userspace using ioctl(UI_DEV_CREATE).\n\nSince nobody knows possible max slots, this patch chose 1024.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2181"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-45008"
		},
		{
			"cve":"CVE-2024-45019",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx5e: Take state lock during tx timeout reporter\n\nmlx5e_safe_reopen_channels() requires the state lock taken. The\nreferenced changed in the Fixes tag removed the lock to fix another\nissue. This patch adds it back but at a later point (when calling\nmlx5e_safe_reopen_channels()) to avoid the deadlock referenced in the\nFixes tag.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2181"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"LOW",
						"baseScore":3.9,
						"vectorString":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Low",
					"category":"impact"
				}
			],
			"title":"CVE-2024-45019"
		},
		{
			"cve":"CVE-2024-45025",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:fix bitmap corruption on close_range() with CLOSE_RANGE_UNSHAREcopy_fd_bitmaps(new, old, count) is expected to copy the firstcount/BITS_PER_LONG bits from old->full_fds_bits[] and fillthe rest with zeroes.  What it does is copying enough words(BITS_TO_LONGS(count/BITS_PER_LONG)), then memsets the rest.That works fine, *if* all bits past the cutoff point areclear.  Otherwise we are risking garbage from the last wordwe d copied.For most of the callers that is true - expand_fdtable() hascount equal to old->max_fds, so there s no open descriptorspast count, let alone fully occupied words in ->open_fds[],which is what bits in ->full_fds_bits[] correspond to.The other caller (dup_fd()) passes sane_fdtable_size(old_fdt, max_fds),which is the smallest multiple of BITS_PER_LONG that covers allopened descriptors below max_fds.  In the common case (copying onfork()) max_fds is ~0U, so all opened descriptors will be belowit and we are fine, by the same reasons why the call in expand_fdtable()is safe.Unfortunately, there is a case where max_fds is less than thatand where we might, indeed, end up with junk in ->full_fds_bits[] -close_range(from, to, CLOSE_RANGE_UNSHARE) with * descriptor table being currently shared *  to  being above the current capacity of descriptor table *  from  being just under some chunk of opened descriptors.In that case we end up with observably wrong behaviour - e.g. spawna child with CLONE_FILES, get all descriptors in range 0..127 open,then close_range(64, ~0U, CLOSE_RANGE_UNSHARE) and watch dup(0) endingup with descriptor #128, despite #64 being observably not open.The minimally invasive fix would be to deal with that in dup_fd().If this proves to add measurable overhead, we can go that way, butlet s try to fix copy_fd_bitmaps() first.* new helper: bitmap_copy_and_expand(to, from, bits_to_copy, size).* make copy_fd_bitmaps() take the bitmap size in words, rather thanbits; it s  count  argument is always a multiple of BITS_PER_LONG,so we are not losing any information, and that way we can use thesame helper for all three bitmaps - compiler will see that countis a multiple of BITS_PER_LONG for the large ones, so it ll generateplain memcpy()+memset().Reproducer added to tools/testing/selftests/core/close_range_test.c",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2181"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-45025"
		},
		{
			"cve":"CVE-2024-46687",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:btrfs: fix a use-after-free when hitting errors inside btrfs_submit_chunk()[BUG]There is an internal report that KASAN is reporting use-after-free, withthe following backtrace:  BUG: KASAN: slab-use-after-free in btrfs_check_read_bio+0xa68/0xb70 [btrfs]  Read of size 4 at addr ffff8881117cec28 by task kworker/u16:2/45  CPU: 1 UID: 0 PID: 45 Comm: kworker/u16:2 Not tainted 6.11.0-rc2-next-20240805-default+ #76  Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.2-3-gd478f380-rebuilt.opensuse.org 04/01/2014  Workqueue: btrfs-endio btrfs_end_bio_work [btrfs]  Call Trace:   dump_stack_lvl+0x61/0x80   print_address_description.constprop.0+0x5e/0x2f0   print_report+0x118/0x216   kasan_report+0x11d/0x1f0   btrfs_check_read_bio+0xa68/0xb70 [btrfs]   process_one_work+0xce0/0x12a0   worker_thread+0x717/0x1250   kthread+0x2e3/0x3c0   ret_from_fork+0x2d/0x70   ret_from_fork_asm+0x11/0x20  Allocated by task 20917:   kasan_save_stack+0x37/0x60   kasan_save_track+0x10/0x30   __kasan_slab_alloc+0x7d/0x80   kmem_cache_alloc_noprof+0x16e/0x3e0   mempool_alloc_noprof+0x12e/0x310   bio_alloc_bioset+0x3f0/0x7a0   btrfs_bio_alloc+0x2e/0x50 [btrfs]   submit_extent_page+0x4d1/0xdb0 [btrfs]   btrfs_do_readpage+0x8b4/0x12a0 [btrfs]   btrfs_readahead+0x29a/0x430 [btrfs]   read_pages+0x1a7/0xc60   page_cache_ra_unbounded+0x2ad/0x560   filemap_get_pages+0x629/0xa20   filemap_read+0x335/0xbf0   vfs_read+0x790/0xcb0   ksys_read+0xfd/0x1d0   do_syscall_64+0x6d/0x140   entry_SYSCALL_64_after_hwframe+0x4b/0x53  Freed by task 20917:   kasan_save_stack+0x37/0x60   kasan_save_track+0x10/0x30   kasan_save_free_info+0x37/0x50   __kasan_slab_free+0x4b/0x60   kmem_cache_free+0x214/0x5d0   bio_free+0xed/0x180   end_bbio_data_read+0x1cc/0x580 [btrfs]   btrfs_submit_chunk+0x98d/0x1880 [btrfs]   btrfs_submit_bio+0x33/0x70 [btrfs]   submit_one_bio+0xd4/0x130 [btrfs]   submit_extent_page+0x3ea/0xdb0 [btrfs]   btrfs_do_readpage+0x8b4/0x12a0 [btrfs]   btrfs_readahead+0x29a/0x430 [btrfs]   read_pages+0x1a7/0xc60   page_cache_ra_unbounded+0x2ad/0x560   filemap_get_pages+0x629/0xa20   filemap_read+0x335/0xbf0   vfs_read+0x790/0xcb0   ksys_read+0xfd/0x1d0   do_syscall_64+0x6d/0x140   entry_SYSCALL_64_after_hwframe+0x4b/0x53[CAUSE]Although I cannot reproduce the error, the report itself is good enoughto pin down the cause.The call trace is the regular endio workqueue context, but thefree-by-task trace is showing that during btrfs_submit_chunk() wealready hit a critical error, and is calling btrfs_bio_end_io() to errorout.  And the original endio function called bio_put() to free the wholebio.This means a double freeing thus causing use-after-free, e.g.:1. Enter btrfs_submit_bio() with a read bio   The read bio length is 128K, crossing two 64K stripes.2. The first run of btrfs_submit_chunk()2.1 Call btrfs_map_block(), which returns 64K2.2 Call btrfs_split_bio()    Now there are two bios, one referring to the first 64K, the other    referring to the second 64K.2.3 The first half is submitted.3. The second run of btrfs_submit_chunk()3.1 Call btrfs_map_block(), which by somehow failed    Now we call btrfs_bio_end_io() to handle the error3.2 btrfs_bio_end_io() calls the original endio function    Which is end_bbio_data_read(), and it calls bio_put() for the    original bio.    Now the original bio is freed.4. The submitted first 64K bio finished   Now we call into btrfs_check_read_bio() and tries to advance the bio   iter.   But since the original bio (thus its iter) is already freed, we   trigger the above use-after free.   And even if the memory is not poisoned/corrupted, we will later call   the original endio function, causing a double freeing.[FIX]Instead of calling btrfs_bio_end_io(), call btrfs_orig_bbio_end_io(),which has the extra check on split bios and do the pr---truncated---",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2181"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.8,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2024-46687"
		},
		{
			"cve":"CVE-2024-46706",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:tty: serial: fsl_lpuart: mark last busy before uart_add_one_portWith  earlycon initcall_debug=1 loglevel=8  in bootargs, kernelsometimes boot hang. It is because normal console still is not ready,but runtime suspend is called, so early console putchar will hangin waiting TRDE set in UARTSTAT.The lpuart driver has auto suspend delay set to 3000ms, but duringuart_add_one_port, a child device serial ctrl will added and probed withits pm runtime enabled(see serial_ctrl.c).The runtime suspend call path is:device_add     |-> bus_probe_device           |->device_initial_probe            |->__device_attach                         |-> pm_runtime_get_sync(dev->parent);    |-> pm_request_idle(dev);    |-> pm_runtime_put(dev->parent);So in the end, before normal console ready, the lpuart get runtimesuspended. And earlycon putchar will hang.To address the issue, mark last busy just after pm_runtime_enable,three seconds is long enough to switch from bootconsole to normalconsole.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2181"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-46706"
		},
		{
			"cve":"CVE-2024-46714",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Skip wbscl_set_scaler_filter if filter is null\n\nCallers can pass null in filter (i.e. from returned from the function\nwbscl_get_filter_coeffs_16p) and a null check is added to ensure that is\nnot the case.\n\nThis fixes 4 NULL_RETURNS issues reported by Coverity.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2181"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"LOW",
						"baseScore":3.9,
						"vectorString":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Low",
					"category":"impact"
				}
			],
			"title":"CVE-2024-46714"
		},
		{
			"cve":"CVE-2024-46720",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:drm/amdgpu: fix dereference after null checkcheck the pointer hive before use.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2181"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-46720"
		},
		{
			"cve":"CVE-2024-46723",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:drm/amdgpu: fix ucode out-of-bounds read warningClear warning that read ucode[] may out-of-bounds.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2181"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.1,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2024-46723"
		},
		{
			"cve":"CVE-2024-46731",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/pm: fix the Out-of-bounds read warning\n\nusing index i - 1U may beyond element index\nfor mc_data[] when i = 0.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2181"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-46731"
		},
		{
			"cve":"CVE-2024-46733",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: fix qgroup reserve leaks in cow_file_range\n\nIn the buffered write path, the dirty page owns the qgroup reserve until\nit creates an ordered_extent.\n\nTherefore, any errors that occur before the ordered_extent is created\nmust free that reservation, or else the space is leaked. The fstest\ngeneric/475 exercises various IO error paths, and is able to trigger\nerrors in cow_file_range where we fail to get to allocating the ordered\nextent. Note that because we *do* clear delalloc, we are likely to\nremove the inode from the delalloc list, so the inodes/pages to not have\ninvalidate/launder called on them in the commit abort path.\n\nThis results in failures at the unmount stage of the test that look like:\n\n  BTRFS: error (device dm-8 state EA) in cleanup_transaction:2018: errno=-5 IO failure\n  BTRFS: error (device dm-8 state EA) in btrfs_replace_file_extents:2416: errno=-5 IO failure\n  BTRFS warning (device dm-8 state EA): qgroup 0/5 has unreleased space, type 0 rsv 28672\n  ------------[ cut here ]------------\n  WARNING: CPU: 3 PID: 22588 at fs/btrfs/disk-io.c:4333 close_ctree+0x222/0x4d0 [btrfs]\n  Modules linked in: btrfs blake2b_generic libcrc32c xor zstd_compress raid6_pq\n  CPU: 3 PID: 22588 Comm: umount Kdump: loaded Tainted: G W          6.10.0-rc7-gab56fde445b8 #21\n  Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS Arch Linux 1.16.3-1-1 04/01/2014\n  RIP: 0010:close_ctree+0x222/0x4d0 [btrfs]\n  RSP: 0018:ffffb4465283be00 EFLAGS: 00010202\n  RAX: 0000000000000001 RBX: ffffa1a1818e1000 RCX: 0000000000000001\n  RDX: 0000000000000000 RSI: ffffb4465283bbe0 RDI: ffffa1a19374fcb8\n  RBP: ffffa1a1818e13c0 R08: 0000000100028b16 R09: 0000000000000000\n  R10: 0000000000000003 R11: 0000000000000003 R12: ffffa1a18ad7972c\n  R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000\n  FS:  00007f9168312b80(0000) GS:ffffa1a4afcc0000(0000) knlGS:0000000000000000\n  CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n  CR2: 00007f91683c9140 CR3: 000000010acaa000 CR4: 00000000000006f0\n  Call Trace:\n   <TASK>\n   ? close_ctree+0x222/0x4d0 [btrfs]\n   ? __warn.cold+0x8e/0xea\n   ? close_ctree+0x222/0x4d0 [btrfs]\n   ? report_bug+0xff/0x140\n   ? handle_bug+0x3b/0x70\n   ? exc_invalid_op+0x17/0x70\n   ? asm_exc_invalid_op+0x1a/0x20\n   ? close_ctree+0x222/0x4d0 [btrfs]\n   generic_shutdown_super+0x70/0x160\n   kill_anon_super+0x11/0x40\n   btrfs_kill_super+0x11/0x20 [btrfs]\n   deactivate_locked_super+0x2e/0xa0\n   cleanup_mnt+0xb5/0x150\n   task_work_run+0x57/0x80\n   syscall_exit_to_user_mode+0x121/0x130\n   do_syscall_64+0xab/0x1a0\n   entry_SYSCALL_64_after_hwframe+0x77/0x7f\n  RIP: 0033:0x7f916847a887\n  ---[ end trace 0000000000000000 ]---\n  BTRFS error (device dm-8 state EA): qgroup reserved space leaked\n\nCases 2 and 3 in the out_reserve path both pertain to this type of leak\nand must free the reserved qgroup data. Because it is already an error\npath, I opted not to handle the possible errors in\nbtrfs_free_qgroup_data.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2181"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-46733"
		},
		{
			"cve":"CVE-2024-46742",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nsmb/server: fix potential null-ptr-deref of lease_ctx_info in smb2_open()\n\nnull-ptr-deref will occur when (req_op_level == SMB2_OPLOCK_LEVEL_LEASE)\nand parse_lease_state() return NULL.\n\nFix this by check if 'lease_ctx_info' is NULL.\n\nAdditionally, remove the redundant parentheses in\nparse_durable_handle_context().",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2181"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-46742"
		},
		{
			"cve":"CVE-2024-46744",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nSquashfs: sanity check symbolic link size\n\nSyzkiller reports a \"KMSAN: uninit-value in pick_link\" bug.\n\nThis is caused by an uninitialised page, which is ultimately caused\nby a corrupted symbolic link size read from disk.\n\nThe reason why the corrupted symlink size causes an uninitialised\npage is due to the following sequence of events:\n\n1. squashfs_read_inode() is called to read the symbolic\n   link from disk.  This assigns the corrupted value\n   3875536935 to inode->i_size.\n\n2. Later squashfs_symlink_read_folio() is called, which assigns\n   this corrupted value to the length variable, which being a\n   signed int, overflows producing a negative number.\n\n3. The following loop that fills in the page contents checks that\n   the copied bytes is less than length, which being negative means\n   the loop is skipped, producing an uninitialised page.\n\nThis patch adds a sanity check which checks that the symbolic\nlink size is not larger than expected.\n\n--\n\nV2: fix spelling mistake.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2181"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-46744"
		},
		{
			"cve":"CVE-2024-46745",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nInput: uinput - reject requests with unreasonable number of slots\n\n\nWhen exercising uinput interface syzkaller may try setting up device\nwith a really large number of slots, which causes memory allocation\nfailure in input_mt_init_slots(). While this allocation failure is\nhandled properly and request is rejected, it results in syzkaller\nreports. Additionally, such request may put undue burden on the\nsystem which will try to free a lot of memory for a bogus request.\n\nFix it by limiting allowed number of slots to 100. This can easily\nbe extended if we see devices that can track more than 100 contacts.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2181"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"LOW",
						"baseScore":3.9,
						"vectorString":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Low",
					"category":"impact"
				}
			],
			"title":"CVE-2024-46745"
		},
		{
			"cve":"CVE-2024-46747",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:HID: cougar: fix slab-out-of-bounds Read in cougar_report_fixupreport_fixup for the Cougar 500k Gaming Keyboard was not verifyingthat the report descriptor size was correct before accessing it",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2181"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.1,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2024-46747"
		},
		{
			"cve":"CVE-2024-46751",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: don't BUG_ON() when 0 reference count at btrfs_lookup_extent_info()\n\nInstead of doing a BUG_ON() handle the error by returning -EUCLEAN,\naborting the transaction and logging an error message.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2181"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-46751"
		},
		{
			"cve":"CVE-2024-46752",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: replace BUG_ON() with error handling at update_ref_for_cow()\n\nInstead of a BUG_ON() just return an error, log an error message and\nabort the transaction in case we find an extent buffer belonging to the\nrelocation tree that doesn't have the full backref flag set. This is\nunexpected and should never happen (save for bugs or a potential bad\nmemory).",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2181"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-46752"
		},
		{
			"cve":"CVE-2024-46759",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nhwmon: (adc128d818) Fix underflows seen when writing limit attributes\n\nDIV_ROUND_CLOSEST() after kstrtol() results in an underflow if a large\nnegative number such as -9223372036854775808 is provided by the user.\nFix it by reordering clamp_val() and DIV_ROUND_CLOSEST() operations.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2181"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.8,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2024-46759"
		},
		{
			"cve":"CVE-2024-46785",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\neventfs: Use list_del_rcu() for SRCU protected list variable\n\nChi Zhiling reported:\n\n  We found a null pointer accessing in tracefs[1], the reason is that the\n  variable 'ei_child' is set to LIST_POISON1, that means the list was\n  removed in eventfs_remove_rec. so when access the ei_child->is_freed, the\n  panic triggered.\n\n  by the way, the following script can reproduce this panic\n\n  loop1 (){\n      while true\n      do\n          echo \"p:kp submit_bio\" > /sys/kernel/debug/tracing/kprobe_events\n          echo \"\" > /sys/kernel/debug/tracing/kprobe_events\n      done\n  }\n  loop2 (){\n      while true\n      do\n          tree /sys/kernel/debug/tracing/events/kprobes/\n      done\n  }\n  loop1 &\n  loop2\n\n  [1]:\n  [ 1147.959632][T17331] Unable to handle kernel paging request at virtual address dead000000000150\n  [ 1147.968239][T17331] Mem abort info:\n  [ 1147.971739][T17331]   ESR = 0x0000000096000004\n  [ 1147.976172][T17331]   EC = 0x25: DABT (current EL), IL = 32 bits\n  [ 1147.982171][T17331]   SET = 0, FnV = 0\n  [ 1147.985906][T17331]   EA = 0, S1PTW = 0\n  [ 1147.989734][T17331]   FSC = 0x04: level 0 translation fault\n  [ 1147.995292][T17331] Data abort info:\n  [ 1147.998858][T17331]   ISV = 0, ISS = 0x00000004, ISS2 = 0x00000000\n  [ 1148.005023][T17331]   CM = 0, WnR = 0, TnD = 0, TagAccess = 0\n  [ 1148.010759][T17331]   GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0\n  [ 1148.016752][T17331] [dead000000000150] address between user and kernel address ranges\n  [ 1148.024571][T17331] Internal error: Oops: 0000000096000004 [#1] SMP\n  [ 1148.030825][T17331] Modules linked in: team_mode_loadbalance team nlmon act_gact cls_flower sch_ingress bonding tls macvlan dummy ib_core bridge stp llc veth amdgpu amdxcp mfd_core gpu_sched drm_exec drm_buddy radeon crct10dif_ce video drm_suballoc_helper ghash_ce drm_ttm_helper sha2_ce ttm sha256_arm64 i2c_algo_bit sha1_ce sbsa_gwdt cp210x drm_display_helper cec sr_mod cdrom drm_kms_helper binfmt_misc sg loop fuse drm dm_mod nfnetlink ip_tables autofs4 [last unloaded: tls]\n  [ 1148.072808][T17331] CPU: 3 PID: 17331 Comm: ls Tainted: G        W         ------- ----  6.6.43 #2\n  [ 1148.081751][T17331] Source Version: 21b3b386e948bedd29369af66f3e98ab01b1c650\n  [ 1148.088783][T17331] Hardware name: Greatwall GW-001M1A-FTF/GW-001M1A-FTF, BIOS KunLun BIOS V4.0 07/16/2020\n  [ 1148.098419][T17331] pstate: 20000005 (nzCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n  [ 1148.106060][T17331] pc : eventfs_iterate+0x2c0/0x398\n  [ 1148.111017][T17331] lr : eventfs_iterate+0x2fc/0x398\n  [ 1148.115969][T17331] sp : ffff80008d56bbd0\n  [ 1148.119964][T17331] x29: ffff80008d56bbf0 x28: ffff001ff5be2600 x27: 0000000000000000\n  [ 1148.127781][T17331] x26: ffff001ff52ca4e0 x25: 0000000000009977 x24: dead000000000100\n  [ 1148.135598][T17331] x23: 0000000000000000 x22: 000000000000000b x21: ffff800082645f10\n  [ 1148.143415][T17331] x20: ffff001fddf87c70 x19: ffff80008d56bc90 x18: 0000000000000000\n  [ 1148.151231][T17331] x17: 0000000000000000 x16: 0000000000000000 x15: ffff001ff52ca4e0\n  [ 1148.159048][T17331] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000\n  [ 1148.166864][T17331] x11: 0000000000000000 x10: 0000000000000000 x9 : ffff8000804391d0\n  [ 1148.174680][T17331] x8 : 0000000180000000 x7 : 0000000000000018 x6 : 0000aaab04b92862\n  [ 1148.182498][T17331] x5 : 0000aaab04b92862 x4 : 0000000080000000 x3 : 0000000000000068\n  [ 1148.190314][T17331] x2 : 000000000000000f x1 : 0000000000007ea8 x0 : 0000000000000001\n  [ 1148.198131][T17331] Call trace:\n  [ 1148.201259][T17331]  eventfs_iterate+0x2c0/0x398\n  [ 1148.205864][T17331]  iterate_dir+0x98/0x188\n  [ 1148.210036][T17331]  __arm64_sys_getdents64+0x78/0x160\n  [ 1148.215161][T17331]  invoke_syscall+0x78/0x108\n  [ 1148.219593][T17331]  el0_svc_common.constprop.0+0x48/0xf0\n  [ 1148.224977][T17331]  do_el0_svc+0x24/0x38\n  [ 1148.228974][T17331]  el0_svc+0x40/0x168\n  [ 1148.232798][T17\n---truncated---",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2181"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":4.8,
						"vectorString":"CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-46785"
		},
		{
			"cve":"CVE-2024-46786",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nfscache: delete fscache_cookie_lru_timer when fscache exits to avoid UAF\n\nThe fscache_cookie_lru_timer is initialized when the fscache module\nis inserted, but is not deleted when the fscache module is removed.\nIf timer_reduce() is called before removing the fscache module,\nthe fscache_cookie_lru_timer will be added to the timer list of\nthe current cpu. Afterwards, a use-after-free will be triggered\nin the softIRQ after removing the fscache module, as follows:\n\n==================================================================\nBUG: unable to handle page fault for address: fffffbfff803c9e9\n PF: supervisor read access in kernel mode\n PF: error_code(0x0000) - not-present page\nPGD 21ffea067 P4D 21ffea067 PUD 21ffe6067 PMD 110a7c067 PTE 0\nOops: Oops: 0000 [#1] PREEMPT SMP KASAN PTI\nCPU: 1 UID: 0 PID: 0 Comm: swapper/1 Tainted: G W 6.11.0-rc3 #855\nTainted: [W]=WARN\nRIP: 0010:__run_timer_base.part.0+0x254/0x8a0\nCall Trace:\n <IRQ>\n tmigr_handle_remote_up+0x627/0x810\n __walk_groups.isra.0+0x47/0x140\n tmigr_handle_remote+0x1fa/0x2f0\n handle_softirqs+0x180/0x590\n irq_exit_rcu+0x84/0xb0\n sysvec_apic_timer_interrupt+0x6e/0x90\n </IRQ>\n <TASK>\n asm_sysvec_apic_timer_interrupt+0x1a/0x20\nRIP: 0010:default_idle+0xf/0x20\n default_idle_call+0x38/0x60\n do_idle+0x2b5/0x300\n cpu_startup_entry+0x54/0x60\n start_secondary+0x20d/0x280\n common_startup_64+0x13e/0x148\n </TASK>\nModules linked in: [last unloaded: netfs]\n==================================================================\n\nTherefore delete fscache_cookie_lru_timer when removing the fscahe module.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2181"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"LOW",
						"baseScore":3.9,
						"vectorString":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Low",
					"category":"impact"
				}
			],
			"title":"CVE-2024-46786"
		},
		{
			"cve":"CVE-2024-46800",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:sch/netem: fix use after free in netem_dequeueIf netem_dequeue() enqueues packet to inner qdisc and that qdiscreturns __NET_XMIT_STOLEN. The packet is dropped butqdisc_tree_reduce_backlog() is not called to update the parent sq.qlen, leading to the similar use-after-free as Commite04991a48dbaf382 ( netem: fix return value if duplicate enqueuefails )Commands to trigger KASAN UaF:ip link add type dummyip link set lo upip link set dummy0 uptc qdisc add dev lo parent root handle 1: drrtc filter add dev lo parent 1: basic classid 1:1tc class add dev lo classid 1:1 drrtc qdisc add dev lo parent 1:1 handle 2: netemtc qdisc add dev lo parent 2: handle 3: drrtc filter add dev lo parent 3: basic classid 3:1 action mirred egressredirect dev dummy0tc class add dev lo classid 3:1 drrping -c1 -W0.01 localhost # Trigger bugtc class del dev lo classid 1:1tc class add dev lo classid 1:1 drrping -c1 -W0.01 localhost # UaF",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2181"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.8,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-44.0.0.50.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-44.0.0.50.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2024-46800"
		}
	]
}