{
	"document":{
		"aggregate_severity":{
			"namespace":"https://nvd.nist.gov/vuln-metrics/cvss",
			"text":"High"
		},
		"category":"csaf_vex",
		"csaf_version":"2.0",
		"distribution":{
			"tlp":{
				"label":"WHITE",
				"url":"https:/www.first.org/tlp/"
			}
		},
		"lang":"en",
		"notes":[
			{
				"text":"kernel security update",
				"category":"general",
				"title":"Synopsis"
			},
			{
				"text":"An update for kernel is now available for openEuler-24.03-LTS",
				"category":"general",
				"title":"Summary"
			},
			{
				"text":"The Linux Kernel, the operating system core itself.\n\nSecurity Fix(es):\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: zoned: fix use-after-free in do_zone_finish()\n\nShinichiro reported the following use-after-free triggered by the device\nreplace operation in fstests btrfs/070.\n\n BTRFS info (device nullb1): scrub: finished on devid 1 with status: 0\n ==================================================================\n BUG: KASAN: slab-use-after-free in do_zone_finish+0x91a/0xb90 [btrfs]\n Read of size 8 at addr ffff8881543c8060 by task btrfs-cleaner/3494007\n\n CPU: 0 PID: 3494007 Comm: btrfs-cleaner Tainted: G        W          6.8.0-rc5-kts #1\n Hardware name: Supermicro Super Server/X11SPi-TF, BIOS 3.3 02/21/2020\n Call Trace:\n  <TASK>\n  dump_stack_lvl+0x5b/0x90\n  print_report+0xcf/0x670\n  ? __virt_addr_valid+0x200/0x3e0\n  kasan_report+0xd8/0x110\n  ? do_zone_finish+0x91a/0xb90 [btrfs]\n  ? do_zone_finish+0x91a/0xb90 [btrfs]\n  do_zone_finish+0x91a/0xb90 [btrfs]\n  btrfs_delete_unused_bgs+0x5e1/0x1750 [btrfs]\n  ? __pfx_btrfs_delete_unused_bgs+0x10/0x10 [btrfs]\n  ? btrfs_put_root+0x2d/0x220 [btrfs]\n  ? btrfs_clean_one_deleted_snapshot+0x299/0x430 [btrfs]\n  cleaner_kthread+0x21e/0x380 [btrfs]\n  ? __pfx_cleaner_kthread+0x10/0x10 [btrfs]\n  kthread+0x2e3/0x3c0\n  ? __pfx_kthread+0x10/0x10\n  ret_from_fork+0x31/0x70\n  ? __pfx_kthread+0x10/0x10\n  ret_from_fork_asm+0x1b/0x30\n  </TASK>\n\n Allocated by task 3493983:\n  kasan_save_stack+0x33/0x60\n  kasan_save_track+0x14/0x30\n  __kasan_kmalloc+0xaa/0xb0\n  btrfs_alloc_device+0xb3/0x4e0 [btrfs]\n  device_list_add.constprop.0+0x993/0x1630 [btrfs]\n  btrfs_scan_one_device+0x219/0x3d0 [btrfs]\n  btrfs_control_ioctl+0x26e/0x310 [btrfs]\n  __x64_sys_ioctl+0x134/0x1b0\n  do_syscall_64+0x99/0x190\n  entry_SYSCALL_64_after_hwframe+0x6e/0x76\n\n Freed by task 3494056:\n  kasan_save_stack+0x33/0x60\n  kasan_save_track+0x14/0x30\n  kasan_save_free_info+0x3f/0x60\n  poison_slab_object+0x102/0x170\n  __kasan_slab_free+0x32/0x70\n  kfree+0x11b/0x320\n  btrfs_rm_dev_replace_free_srcdev+0xca/0x280 [btrfs]\n  btrfs_dev_replace_finishing+0xd7e/0x14f0 [btrfs]\n  btrfs_dev_replace_by_ioctl+0x1286/0x25a0 [btrfs]\n  btrfs_ioctl+0xb27/0x57d0 [btrfs]\n  __x64_sys_ioctl+0x134/0x1b0\n  do_syscall_64+0x99/0x190\n  entry_SYSCALL_64_after_hwframe+0x6e/0x76\n\n The buggy address belongs to the object at ffff8881543c8000\n  which belongs to the cache kmalloc-1k of size 1024\n The buggy address is located 96 bytes inside of\n  freed 1024-byte region [ffff8881543c8000, ffff8881543c8400)\n\n The buggy address belongs to the physical page:\n page:00000000fe2c1285 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1543c8\n head:00000000fe2c1285 order:3 entire_mapcount:0 nr_pages_mapped:0 pincount:0\n flags: 0x17ffffc0000840(slab|head|node=0|zone=2|lastcpupid=0x1fffff)\n page_type: 0xffffffff()\n raw: 0017ffffc0000840 ffff888100042dc0 ffffea0019e8f200 dead000000000002\n raw: 0000000000000000 0000000000100010 00000001ffffffff 0000000000000000\n page dumped because: kasan: bad access detected\n\n Memory state around the buggy address:\n  ffff8881543c7f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00\n  ffff8881543c7f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00\n >ffff8881543c8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb\n                                                        ^\n  ffff8881543c8080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb\n  ffff8881543c8100: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb\n\nThis UAF happens because we're accessing stale zone information of a\nalready removed btrfs_device in do_zone_finish().\n\nThe sequence of events is as follows:\n\nbtrfs_dev_replace_start\n  btrfs_scrub_dev\n   btrfs_dev_replace_finishing\n    btrfs_dev_replace_update_device_in_mapping_tree <-- devices replaced\n    btrfs_rm_dev_replace_free_srcdev\n     btrfs_free_device                              <-- device freed\n\ncleaner_kthread\n btrfs_delete_unused_bgs\n  btrfs_zone_finish\n   do_zone_finish              <-- refers the freed device\n\nThe reason for this is that we're using a\n---truncated---(CVE-2024-26944)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: HCI: Fix potential null-ptr-deref\n\nFix potential null-ptr-deref in hci_le_big_sync_established_evt().(CVE-2024-36011)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nvirtio_net: Fix napi_skb_cache_put warning\n\nAfter the commit bdacf3e34945 (\"net: Use nested-BH locking for\nnapi_alloc_cache.\") was merged, the following warning began to appear:\n\n\t WARNING: CPU: 5 PID: 1 at net/core/skbuff.c:1451 napi_skb_cache_put+0x82/0x4b0\n\n\t  __warn+0x12f/0x340\n\t  napi_skb_cache_put+0x82/0x4b0\n\t  napi_skb_cache_put+0x82/0x4b0\n\t  report_bug+0x165/0x370\n\t  handle_bug+0x3d/0x80\n\t  exc_invalid_op+0x1a/0x50\n\t  asm_exc_invalid_op+0x1a/0x20\n\t  __free_old_xmit+0x1c8/0x510\n\t  napi_skb_cache_put+0x82/0x4b0\n\t  __free_old_xmit+0x1c8/0x510\n\t  __free_old_xmit+0x1c8/0x510\n\t  __pfx___free_old_xmit+0x10/0x10\n\nThe issue arises because virtio is assuming it's running in NAPI context\neven when it's not, such as in the netpoll case.\n\nTo resolve this, modify virtnet_poll_tx() to only set NAPI when budget\nis available. Same for virtnet_poll_cleantx(), which always assumed that\nit was in a NAPI context.(CVE-2024-43835)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nwifi: mac80211: fix NULL dereference at band check in starting tx ba session\n\nIn MLD connection, link_data/link_conf are dynamically allocated. They\ndon't point to vif->bss_conf. So, there will be no chanreq assigned to\nvif->bss_conf and then the chan will be NULL. Tweak the code to check\nht_supported/vht_supported/has_he/has_eht on sta deflink.\n\nCrash log (with rtw89 version under MLO development):\n[ 9890.526087] BUG: kernel NULL pointer dereference, address: 0000000000000000\n[ 9890.526102] #PF: supervisor read access in kernel mode\n[ 9890.526105] #PF: error_code(0x0000) - not-present page\n[ 9890.526109] PGD 0 P4D 0\n[ 9890.526114] Oops: 0000 [#1] PREEMPT SMP PTI\n[ 9890.526119] CPU: 2 PID: 6367 Comm: kworker/u16:2 Kdump: loaded Tainted: G           OE      6.9.0 #1\n[ 9890.526123] Hardware name: LENOVO 2356AD1/2356AD1, BIOS G7ETB3WW (2.73 ) 11/28/2018\n[ 9890.526126] Workqueue: phy2 rtw89_core_ba_work [rtw89_core]\n[ 9890.526203] RIP: 0010:ieee80211_start_tx_ba_session (net/mac80211/agg-tx.c:618 (discriminator 1)) mac80211\n[ 9890.526279] Code: f7 e8 d5 93 3e ea 48 83 c4 28 89 d8 5b 41 5c 41 5d 41 5e 41 5f 5d c3 cc cc cc cc 49 8b 84 24 e0 f1 ff ff 48 8b 80 90 1b 00 00 <83> 38 03 0f 84 37 fe ff ff bb ea ff ff ff eb cc 49 8b 84 24 10 f3\nAll code\n========\n   0:\tf7 e8                \timul   %eax\n   2:\td5                   \t(bad)\n   3:\t93                   \txchg   %eax,%ebx\n   4:\t3e ea                \tds (bad)\n   6:\t48 83 c4 28          \tadd    $0x28,%rsp\n   a:\t89 d8                \tmov    %ebx,%eax\n   c:\t5b                   \tpop    %rbx\n   d:\t41 5c                \tpop    %r12\n   f:\t41 5d                \tpop    %r13\n  11:\t41 5e                \tpop    %r14\n  13:\t41 5f                \tpop    %r15\n  15:\t5d                   \tpop    %rbp\n  16:\tc3                   \tretq\n  17:\tcc                   \tint3\n  18:\tcc                   \tint3\n  19:\tcc                   \tint3\n  1a:\tcc                   \tint3\n  1b:\t49 8b 84 24 e0 f1 ff \tmov    -0xe20(%r12),%rax\n  22:\tff\n  23:\t48 8b 80 90 1b 00 00 \tmov    0x1b90(%rax),%rax\n  2a:*\t83 38 03             \tcmpl   $0x3,(%rax)\t\t<-- trapping instruction\n  2d:\t0f 84 37 fe ff ff    \tje     0xfffffffffffffe6a\n  33:\tbb ea ff ff ff       \tmov    $0xffffffea,%ebx\n  38:\teb cc                \tjmp    0x6\n  3a:\t49                   \trex.WB\n  3b:\t8b                   \t.byte 0x8b\n  3c:\t84 24 10             \ttest   %ah,(%rax,%rdx,1)\n  3f:\tf3                   \trepz\n\nCode starting with the faulting instruction\n===========================================\n   0:\t83 38 03             \tcmpl   $0x3,(%rax)\n   3:\t0f 84 37 fe ff ff    \tje     0xfffffffffffffe40\n   9:\tbb ea ff ff ff       \tmov    $0xffffffea,%ebx\n   e:\teb cc                \tjmp    0xffffffffffffffdc\n  10:\t49                   \trex.WB\n  11:\t8b                   \t.byte 0x8b\n  12:\t84 24 10             \ttest   %ah,(%rax,%rdx,1)\n  15:\tf3                   \trepz\n[ 9890.526285] RSP: 0018:ffffb8db09013d68 EFLAGS: 00010246\n[ 9890.526291] RAX: 0000000000000000 RBX: 0000000000000000 RCX: ffff9308e0d656c8\n[ 9890.526295] RDX: 0000000000000000 RSI: ffffffffab99460b RDI: ffffffffab9a7685\n[ 9890.526300] RBP: ffffb8db09013db8 R08: 0000000000000000 R09: 0000000000000873\n[ 9890.526304] R10: ffff9308e0d64800 R11: 0000000000000002 R12: ffff9308e5ff6e70\n[ 9890.526308] R13: ffff930952500e20 R14: ffff9309192a8c00 R15: 0000000000000000\n[ 9890.526313] FS:  0000000000000000(0000) GS:ffff930b4e700000(0000) knlGS:0000000000000000\n[ 9890.526316] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ 9890.526318] CR2: 0000000000000000 CR3: 0000000391c58005 CR4: 00000000001706f0\n[ 9890.526321] Call Trace:\n[ 9890.526324]  <TASK>\n[ 9890.526327] ? show_regs (arch/x86/kernel/dumpstack.c:479)\n[ 9890.526335] ? __die (arch/x86/kernel/dumpstack.c:421 arch/x86/kernel/dumpstack.c:434)\n[ 9890.526340] ? page_fault_oops (arch/x86/mm/fault.c:713)\n[ 9890.526347] ? search_module_extables (kernel/module/main.c:3256 (discriminator\n---truncated---(CVE-2024-43911)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nbonding: fix xfrm real_dev null pointer dereference\n\nWe shouldn't set real_dev to NULL because packets can be in transit and\nxfrm might call xdo_dev_offload_ok() in parallel. All callbacks assume\nreal_dev is set.\n\n Example trace:\n kernel: BUG: unable to handle page fault for address: 0000000000001030\n kernel: bond0: (slave eni0np1): making interface the new active one\n kernel: #PF: supervisor write access in kernel mode\n kernel: #PF: error_code(0x0002) - not-present page\n kernel: PGD 0 P4D 0\n kernel: Oops: 0002 [#1] PREEMPT SMP\n kernel: CPU: 4 PID: 2237 Comm: ping Not tainted 6.7.7+ #12\n kernel: Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-2.fc40 04/01/2014\n kernel: RIP: 0010:nsim_ipsec_offload_ok+0xc/0x20 [netdevsim]\n kernel: bond0: (slave eni0np1): bond_ipsec_add_sa_all: failed to add SA\n kernel: Code: e0 0f 0b 48 83 7f 38 00 74 de 0f 0b 48 8b 47 08 48 8b 37 48 8b 78 40 e9 b2 e5 9a d7 66 90 0f 1f 44 00 00 48 8b 86 80 02 00 00 <83> 80 30 10 00 00 01 b8 01 00 00 00 c3 0f 1f 80 00 00 00 00 0f 1f\n kernel: bond0: (slave eni0np1): making interface the new active one\n kernel: RSP: 0018:ffffabde81553b98 EFLAGS: 00010246\n kernel: bond0: (slave eni0np1): bond_ipsec_add_sa_all: failed to add SA\n kernel:\n kernel: RAX: 0000000000000000 RBX: ffff9eb404e74900 RCX: ffff9eb403d97c60\n kernel: RDX: ffffffffc090de10 RSI: ffff9eb404e74900 RDI: ffff9eb3c5de9e00\n kernel: RBP: ffff9eb3c0a42000 R08: 0000000000000010 R09: 0000000000000014\n kernel: R10: 7974203030303030 R11: 3030303030303030 R12: 0000000000000000\n kernel: R13: ffff9eb3c5de9e00 R14: ffffabde81553cc8 R15: ffff9eb404c53000\n kernel: FS:  00007f2a77a3ad00(0000) GS:ffff9eb43bd00000(0000) knlGS:0000000000000000\n kernel: CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n kernel: CR2: 0000000000001030 CR3: 00000001122ab000 CR4: 0000000000350ef0\n kernel: bond0: (slave eni0np1): making interface the new active one\n kernel: Call Trace:\n kernel:  <TASK>\n kernel:  ? __die+0x1f/0x60\n kernel: bond0: (slave eni0np1): bond_ipsec_add_sa_all: failed to add SA\n kernel:  ? page_fault_oops+0x142/0x4c0\n kernel:  ? do_user_addr_fault+0x65/0x670\n kernel:  ? kvm_read_and_reset_apf_flags+0x3b/0x50\n kernel: bond0: (slave eni0np1): making interface the new active one\n kernel:  ? exc_page_fault+0x7b/0x180\n kernel:  ? asm_exc_page_fault+0x22/0x30\n kernel:  ? nsim_bpf_uninit+0x50/0x50 [netdevsim]\n kernel: bond0: (slave eni0np1): bond_ipsec_add_sa_all: failed to add SA\n kernel:  ? nsim_ipsec_offload_ok+0xc/0x20 [netdevsim]\n kernel: bond0: (slave eni0np1): making interface the new active one\n kernel:  bond_ipsec_offload_ok+0x7b/0x90 [bonding]\n kernel:  xfrm_output+0x61/0x3b0\n kernel: bond0: (slave eni0np1): bond_ipsec_add_sa_all: failed to add SA\n kernel:  ip_push_pending_frames+0x56/0x80(CVE-2024-44989)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nigb: cope with large MAX_SKB_FRAGS\n\nSabrina reports that the igb driver does not cope well with large\nMAX_SKB_FRAG values: setting MAX_SKB_FRAG to 45 causes payload\ncorruption on TX.\n\nAn easy reproducer is to run ssh to connect to the machine.  With\nMAX_SKB_FRAGS=17 it works, with MAX_SKB_FRAGS=45 it fails.  This has\nbeen reported originally in\nhttps://bugzilla.redhat.com/show_bug.cgi?id=2265320\n\nThe root cause of the issue is that the driver does not take into\naccount properly the (possibly large) shared info size when selecting\nthe ring layout, and will try to fit two packets inside the same 4K\npage even when the 1st fraglist will trump over the 2nd head.\n\nAddress the issue by checking if 2K buffers are insufficient.(CVE-2024-45030)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nbonding: change ipsec_lock from spin lock to mutex\n\nIn the cited commit, bond->ipsec_lock is added to protect ipsec_list,\nhence xdo_dev_state_add and xdo_dev_state_delete are called inside\nthis lock. As ipsec_lock is a spin lock and such xfrmdev ops may sleep,\n\"scheduling while atomic\" will be triggered when changing bond's\nactive slave.\n\n[  101.055189] BUG: scheduling while atomic: bash/902/0x00000200\n[  101.055726] Modules linked in:\n[  101.058211] CPU: 3 PID: 902 Comm: bash Not tainted 6.9.0-rc4+ #1\n[  101.058760] Hardware name:\n[  101.059434] Call Trace:\n[  101.059436]  <TASK>\n[  101.060873]  dump_stack_lvl+0x51/0x60\n[  101.061275]  __schedule_bug+0x4e/0x60\n[  101.061682]  __schedule+0x612/0x7c0\n[  101.062078]  ? __mod_timer+0x25c/0x370\n[  101.062486]  schedule+0x25/0xd0\n[  101.062845]  schedule_timeout+0x77/0xf0\n[  101.063265]  ? asm_common_interrupt+0x22/0x40\n[  101.063724]  ? __bpf_trace_itimer_state+0x10/0x10\n[  101.064215]  __wait_for_common+0x87/0x190\n[  101.064648]  ? usleep_range_state+0x90/0x90\n[  101.065091]  cmd_exec+0x437/0xb20 [mlx5_core]\n[  101.065569]  mlx5_cmd_do+0x1e/0x40 [mlx5_core]\n[  101.066051]  mlx5_cmd_exec+0x18/0x30 [mlx5_core]\n[  101.066552]  mlx5_crypto_create_dek_key+0xea/0x120 [mlx5_core]\n[  101.067163]  ? bonding_sysfs_store_option+0x4d/0x80 [bonding]\n[  101.067738]  ? kmalloc_trace+0x4d/0x350\n[  101.068156]  mlx5_ipsec_create_sa_ctx+0x33/0x100 [mlx5_core]\n[  101.068747]  mlx5e_xfrm_add_state+0x47b/0xaa0 [mlx5_core]\n[  101.069312]  bond_change_active_slave+0x392/0x900 [bonding]\n[  101.069868]  bond_option_active_slave_set+0x1c2/0x240 [bonding]\n[  101.070454]  __bond_opt_set+0xa6/0x430 [bonding]\n[  101.070935]  __bond_opt_set_notify+0x2f/0x90 [bonding]\n[  101.071453]  bond_opt_tryset_rtnl+0x72/0xb0 [bonding]\n[  101.071965]  bonding_sysfs_store_option+0x4d/0x80 [bonding]\n[  101.072567]  kernfs_fop_write_iter+0x10c/0x1a0\n[  101.073033]  vfs_write+0x2d8/0x400\n[  101.073416]  ? alloc_fd+0x48/0x180\n[  101.073798]  ksys_write+0x5f/0xe0\n[  101.074175]  do_syscall_64+0x52/0x110\n[  101.074576]  entry_SYSCALL_64_after_hwframe+0x4b/0x53\n\nAs bond_ipsec_add_sa_all and bond_ipsec_del_sa_all are only called\nfrom bond_change_active_slave, which requires holding the RTNL lock.\nAnd bond_ipsec_add_sa and bond_ipsec_del_sa are xfrm state\nxdo_dev_state_add and xdo_dev_state_delete APIs, which are in user\ncontext. So ipsec_lock doesn't have to be spin lock, change it to\nmutex, and thus the above issue can be resolved.(CVE-2024-46678)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nfou: Fix null-ptr-deref in GRO.\n\nWe observed a null-ptr-deref in fou_gro_receive() while shutting down\na host.  [0]\n\nThe NULL pointer is sk->sk_user_data, and the offset 8 is of protocol\nin struct fou.\n\nWhen fou_release() is called due to netns dismantle or explicit tunnel\nteardown, udp_tunnel_sock_release() sets NULL to sk->sk_user_data.\nThen, the tunnel socket is destroyed after a single RCU grace period.\n\nSo, in-flight udp4_gro_receive() could find the socket and execute the\nFOU GRO handler, where sk->sk_user_data could be NULL.\n\nLet's use rcu_dereference_sk_user_data() in fou_from_sock() and add NULL\nchecks in FOU GRO handlers.\n\n[0]:\nBUG: kernel NULL pointer dereference, address: 0000000000000008\n PF: supervisor read access in kernel mode\n PF: error_code(0x0000) - not-present page\nPGD 80000001032f4067 P4D 80000001032f4067 PUD 103240067 PMD 0\nSMP PTI\nCPU: 0 PID: 0 Comm: swapper/0 Not tainted 5.10.216-204.855.amzn2.x86_64 #1\nHardware name: Amazon EC2 c5.large/, BIOS 1.0 10/16/2017\nRIP: 0010:fou_gro_receive (net/ipv4/fou.c:233) [fou]\nCode: 41 5f c3 cc cc cc cc e8 e7 2e 69 f4 0f 1f 80 00 00 00 00 0f 1f 44 00 00 49 89 f8 41 54 48 89 f7 48 89 d6 49 8b 80 88 02 00 00 <0f> b6 48 08 0f b7 42 4a 66 25 fd fd 80 cc 02 66 89 42 4a 0f b6 42\nRSP: 0018:ffffa330c0003d08 EFLAGS: 00010297\nRAX: 0000000000000000 RBX: ffff93d9e3a6b900 RCX: 0000000000000010\nRDX: ffff93d9e3a6b900 RSI: ffff93d9e3a6b900 RDI: ffff93dac2e24d08\nRBP: ffff93d9e3a6b900 R08: ffff93dacbce6400 R09: 0000000000000002\nR10: 0000000000000000 R11: ffffffffb5f369b0 R12: ffff93dacbce6400\nR13: ffff93dac2e24d08 R14: 0000000000000000 R15: ffffffffb4edd1c0\nFS:  0000000000000000(0000) GS:ffff93daee800000(0000) knlGS:0000000000000000\nCS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000000000000008 CR3: 0000000102140001 CR4: 00000000007706f0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nPKRU: 55555554\nCall Trace:\n <IRQ>\n ? show_trace_log_lvl (arch/x86/kernel/dumpstack.c:259)\n ? __die_body.cold (arch/x86/kernel/dumpstack.c:478 arch/x86/kernel/dumpstack.c:420)\n ? no_context (arch/x86/mm/fault.c:752)\n ? exc_page_fault (arch/x86/include/asm/irqflags.h:49 arch/x86/include/asm/irqflags.h:89 arch/x86/mm/fault.c:1435 arch/x86/mm/fault.c:1483)\n ? asm_exc_page_fault (arch/x86/include/asm/idtentry.h:571)\n ? fou_gro_receive (net/ipv4/fou.c:233) [fou]\n udp_gro_receive (include/linux/netdevice.h:2552 net/ipv4/udp_offload.c:559)\n udp4_gro_receive (net/ipv4/udp_offload.c:604)\n inet_gro_receive (net/ipv4/af_inet.c:1549 (discriminator 7))\n dev_gro_receive (net/core/dev.c:6035 (discriminator 4))\n napi_gro_receive (net/core/dev.c:6170)\n ena_clean_rx_irq (drivers/amazon/net/ena/ena_netdev.c:1558) [ena]\n ena_io_poll (drivers/amazon/net/ena/ena_netdev.c:1742) [ena]\n napi_poll (net/core/dev.c:6847)\n net_rx_action (net/core/dev.c:6917)\n __do_softirq (arch/x86/include/asm/jump_label.h:25 include/linux/jump_label.h:200 include/trace/events/irq.h:142 kernel/softirq.c:299)\n asm_call_irq_on_stack (arch/x86/entry/entry_64.S:809)\n</IRQ>\n do_softirq_own_stack (arch/x86/include/asm/irq_stack.h:27 arch/x86/include/asm/irq_stack.h:77 arch/x86/kernel/irq_64.c:77)\n irq_exit_rcu (kernel/softirq.c:393 kernel/softirq.c:423 kernel/softirq.c:435)\n common_interrupt (arch/x86/kernel/irq.c:239)\n asm_common_interrupt (arch/x86/include/asm/idtentry.h:626)\nRIP: 0010:acpi_idle_do_entry (arch/x86/include/asm/irqflags.h:49 arch/x86/include/asm/irqflags.h:89 drivers/acpi/processor_idle.c:114 drivers/acpi/processor_idle.c:575)\nCode: 8b 15 d1 3c c4 02 ed c3 cc cc cc cc 65 48 8b 04 25 40 ef 01 00 48 8b 00 a8 08 75 eb 0f 1f 44 00 00 0f 00 2d d5 09 55 00 fb f4 <fa> c3 cc cc cc cc e9 be fc ff ff 66 66 2e 0f 1f 84 00 00 00 00 00\nRSP: 0018:ffffffffb5603e58 EFLAGS: 00000246\nRAX: 0000000000004000 RBX: ffff93dac0929c00 RCX: ffff93daee833900\nRDX: ffff93daee800000 RSI: ffff93d\n---truncated---(CVE-2024-46763)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\ntcp_bpf: fix return value of tcp_bpf_sendmsg()\n\nWhen we cork messages in psock->cork, the last message triggers the\nflushing will result in sending a sk_msg larger than the current\nmessage size. In this case, in tcp_bpf_send_verdict(), 'copied' becomes\nnegative at least in the following case:\n\n468         case __SK_DROP:\n469         default:\n470                 sk_msg_free_partial(sk, msg, tosend);\n471                 sk_msg_apply_bytes(psock, tosend);\n472                 *copied -= (tosend + delta); // <==== HERE\n473                 return -EACCES;\n\nTherefore, it could lead to the following BUG with a proper value of\n'copied' (thanks to syzbot). We should not use negative 'copied' as a\nreturn value here.\n\n  ------------[ cut here ]------------\n  kernel BUG at net/socket.c:733!\n  Internal error: Oops - BUG: 00000000f2000800 [#1] PREEMPT SMP\n  Modules linked in:\n  CPU: 0 UID: 0 PID: 3265 Comm: syz-executor510 Not tainted 6.11.0-rc3-syzkaller-00060-gd07b43284ab3 #0\n  Hardware name: linux,dummy-virt (DT)\n  pstate: 61400009 (nZCv daif +PAN -UAO -TCO +DIT -SSBS BTYPE=--)\n  pc : sock_sendmsg_nosec net/socket.c:733 [inline]\n  pc : sock_sendmsg_nosec net/socket.c:728 [inline]\n  pc : __sock_sendmsg+0x5c/0x60 net/socket.c:745\n  lr : sock_sendmsg_nosec net/socket.c:730 [inline]\n  lr : __sock_sendmsg+0x54/0x60 net/socket.c:745\n  sp : ffff800088ea3b30\n  x29: ffff800088ea3b30 x28: fbf00000062bc900 x27: 0000000000000000\n  x26: ffff800088ea3bc0 x25: ffff800088ea3bc0 x24: 0000000000000000\n  x23: f9f00000048dc000 x22: 0000000000000000 x21: ffff800088ea3d90\n  x20: f9f00000048dc000 x19: ffff800088ea3d90 x18: 0000000000000001\n  x17: 0000000000000000 x16: 0000000000000000 x15: 000000002002ffaf\n  x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000\n  x11: 0000000000000000 x10: ffff8000815849c0 x9 : ffff8000815b49c0\n  x8 : 0000000000000000 x7 : 000000000000003f x6 : 0000000000000000\n  x5 : 00000000000007e0 x4 : fff07ffffd239000 x3 : fbf00000062bc900\n  x2 : 0000000000000000 x1 : 0000000000000000 x0 : 00000000fffffdef\n  Call trace:\n   sock_sendmsg_nosec net/socket.c:733 [inline]\n   __sock_sendmsg+0x5c/0x60 net/socket.c:745\n   ____sys_sendmsg+0x274/0x2ac net/socket.c:2597\n   ___sys_sendmsg+0xac/0x100 net/socket.c:2651\n   __sys_sendmsg+0x84/0xe0 net/socket.c:2680\n   __do_sys_sendmsg net/socket.c:2689 [inline]\n   __se_sys_sendmsg net/socket.c:2687 [inline]\n   __arm64_sys_sendmsg+0x24/0x30 net/socket.c:2687\n   __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline]\n   invoke_syscall+0x48/0x110 arch/arm64/kernel/syscall.c:49\n   el0_svc_common.constprop.0+0x40/0xe0 arch/arm64/kernel/syscall.c:132\n   do_el0_svc+0x1c/0x28 arch/arm64/kernel/syscall.c:151\n   el0_svc+0x34/0xec arch/arm64/kernel/entry-common.c:712\n   el0t_64_sync_handler+0x100/0x12c arch/arm64/kernel/entry-common.c:730\n   el0t_64_sync+0x19c/0x1a0 arch/arm64/kernel/entry.S:598\n  Code: f9404463 d63f0060 3108441f 54fffe81 (d4210000)\n  ---[ end trace 0000000000000000 ]---(CVE-2024-46783)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amdgpu: Fix smatch static checker warning\n\nadev->gfx.imu.funcs could be NULL(CVE-2024-46835)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nscsi: pm80xx: Set phy->enable_completion only when we wait for it\n\npm8001_phy_control() populates the enable_completion pointer with a stack\naddress, sends a PHY_LINK_RESET / PHY_HARD_RESET, waits 300 ms, and\nreturns. The problem arises when a phy control response comes late.  After\n300 ms the pm8001_phy_control() function returns and the passed\nenable_completion stack address is no longer valid. Late phy control\nresponse invokes complete() on a dangling enable_completion pointer which\nleads to a kernel crash.(CVE-2024-47666)\n\nIn the Linux kernel, the following vulnerability has been resolved:  mm: avoid leaving partial pfn mappings around in error case  As Jann points out, PFN mappings are special, because unlike normal memory mappings, there is no lifetime information associated with the mapping - it is just a raw mapping of PFNs with no reference counting of a 'struct page'.  That's all very much intentional, but it does mean that it's easy to mess up the cleanup in case of errors.  Yes, a failed mmap() will always eventually clean up any partial mappings, but without any explicit lifetime in the page table mapping itself, it's very easy to do the error handling in the wrong order.  In particular, it's easy to mistakenly free the physical backing store before the page tables are actually cleaned up and (temporarily) have stale dangling PTE entries.  To make this situation less error-prone, just make sure that any partial pfn mapping is torn down early, before any other error handling.(CVE-2024-47674)\n\nIn the Linux kernel, the following vulnerability has been resolved:  jfs: fix out-of-bounds in dbNextAG() and diAlloc()  In dbNextAG() , there is no check for the case where bmp->db_numag is greater or same than MAXAG due to a polluted image, which causes an out-of-bounds. Therefore, a bounds check should be added in dbMount().  And in dbNextAG(), a check for the case where agpref is greater than bmp->db_numag should be added, so an out-of-bounds exception should be prevented.  Additionally, a check for the case where agno is greater or same than MAXAG should be added in diAlloc() to prevent out-of-bounds.(CVE-2024-47723)\n\nIn the Linux kernel, the following vulnerability has been resolved:  bpf: Zero former ARG_PTR_TO_{LONG,INT} args in case of error  For all non-tracing helpers which formerly had ARG_PTR_TO_{LONG,INT} as input arguments, zero the value for the case of an error as otherwise it could leak memory. For tracing, it is not needed given CAP_PERFMON can already read all kernel memory anyway hence bpf_get_func_arg() and bpf_get_func_ret() is skipped in here.  Also, the MTU helpers mtu_len pointer value is being written but also read. Technically, the MEM_UNINIT should not be there in order to always force init. Removing MEM_UNINIT needs more verifier rework though: MEM_UNINIT right now implies two things actually: i) write into memory, ii) memory does not have to be initialized. If we lift MEM_UNINIT, it then becomes: i) read into memory, ii) memory must be initialized. This means that for bpf_*_check_mtu() we're readding the issue we're trying to fix, that is, it would then be able to write back into things like .rodata BPF maps. Follow-up work will rework the MEM_UNINIT semantics such that the intent can be better expressed. For now just clear the *mtu_len on error path which can be lifted later again.(CVE-2024-47728)\n\nIn the Linux kernel, the following vulnerability has been resolved:  net/ncsi: Disable the ncsi work before freeing the associated structure  The work function can run after the ncsi device is freed, resulting in use-after-free bugs or kernel panic.(CVE-2024-49945)\n\nIn the Linux kernel, the following vulnerability has been resolved:  usb: gadget: uvc: Fix ERR_PTR dereference in uvc_v4l2.c  Fix potential dereferencing of ERR_PTR() in find_format_by_pix() and uvc_v4l2_enum_format().  Fix the following smatch errors:  drivers/usb/gadget/function/uvc_v4l2.c:124 find_format_by_pix() error: 'fmtdesc' dereferencing possible ERR_PTR()  drivers/usb/gadget/function/uvc_v4l2.c:392 uvc_v4l2_enum_format() error: 'fmtdesc' dereferencing possible ERR_PTR()  Also, fix similar issue in uvc_v4l2_try_format() for potential dereferencing of ERR_PTR().(CVE-2024-50056)\n\nIn the Linux kernel, the following vulnerability has been resolved:  i3c: master: cdns: Fix use after free vulnerability in cdns_i3c_master Driver Due to Race Condition  In the cdns_i3c_master_probe function, &master->hj_work is bound with cdns_i3c_master_hj. And cdns_i3c_master_interrupt can call cnds_i3c_master_demux_ibis function to start the work.  If we remove the module which will call cdns_i3c_master_remove to make cleanup, it will free master->base through i3c_master_unregister while the work mentioned above will be used. The sequence of operations that may lead to a UAF bug is as follows:  CPU0                                      CPU1                                       | cdns_i3c_master_hj cdns_i3c_master_remove               | i3c_master_unregister(&master->base) | device_unregister(&master->dev)      | device_release                       | //free master->base                  |                                      | i3c_master_do_daa(&master->base)                                      | //use master->base  Fix it by ensuring that the work is canceled before proceeding with the cleanup in cdns_i3c_master_remove.(CVE-2024-50061)\n\nIn the Linux kernel, the following vulnerability has been resolved:  unicode: Don't special case ignorable code points  We don't need to handle them separately. Instead, just let them decompose/casefold to themselves.(CVE-2024-50089)\n\nIn the Linux kernel, the following vulnerability has been resolved:  arm64: probes: Remove broken LDR (literal) uprobe support  The simulate_ldr_literal() and simulate_ldrsw_literal() functions are unsafe to use for uprobes. Both functions were originally written for use with kprobes, and access memory with plain C accesses. When uprobes was added, these were reused unmodified even though they cannot safely access user memory.  There are three key problems:  1) The plain C accesses do not have corresponding extable entries, and    thus if they encounter a fault the kernel will treat these as    unintentional accesses to user memory, resulting in a BUG() which    will kill the kernel thread, and likely lead to further issues (e.g.    lockup or panic()).  2) The plain C accesses are subject to HW PAN and SW PAN, and so when    either is in use, any attempt to simulate an access to user memory    will fault. Thus neither simulate_ldr_literal() nor    simulate_ldrsw_literal() can do anything useful when simulating a    user instruction on any system with HW PAN or SW PAN.  3) The plain C accesses are privileged, as they run in kernel context,    and in practice can access a small range of kernel virtual addresses.    The instructions they simulate have a range of +/-1MiB, and since the    simulated instructions must itself be a user instructions in the    TTBR0 address range, these can address the final 1MiB of the TTBR1    acddress range by wrapping downwards from an address in the first    1MiB of the TTBR0 address range.     In contemporary kernels the last 8MiB of TTBR1 address range is    reserved, and accesses to this will always fault, meaning this is no    worse than (1).     Historically, it was theoretically possible for the linear map or    vmemmap to spill into the final 8MiB of the TTBR1 address range, but    in practice this is extremely unlikely to occur as this would    require either:     * Having enough physical memory to fill the entire linear map all the      way to the final 1MiB of the TTBR1 address range.     * Getting unlucky with KASLR randomization of the linear map such      that the populated region happens to overlap with the last 1MiB of      the TTBR address range.     ... and in either case if we were to spill into the final page there    would be larger problems as the final page would alias with error    pointers.  Practically speaking, (1) and (2) are the big issues. Given there have been no reports of problems since the broken code was introduced, it appears that no-one is relying on probing these instructions with uprobes.  Avoid these issues by not allowing uprobes on LDR (literal) and LDRSW (literal), limiting the use of simulate_ldr_literal() and simulate_ldrsw_literal() to kprobes. Attempts to place uprobes on LDR (literal) and LDRSW (literal) will be rejected as arm_probe_decode_insn() will return INSN_REJECTED. In future we can consider introducing working uprobes support for these instructions, but this will require more significant work.(CVE-2024-50099)\n\nIn the Linux kernel, the following vulnerability has been resolved:  KVM: nSVM: Ignore nCR3[4:0] when loading PDPTEs from memory  Ignore nCR3[4:0] when loading PDPTEs from memory for nested SVM, as bits 4:0 of CR3 are ignored when PAE paging is used, and thus VMRUN doesn't enforce 32-byte alignment of nCR3.  In the absolute worst case scenario, failure to ignore bits 4:0 can result in an out-of-bounds read, e.g. if the target page is at the end of a memslot, and the VMM isn't using guard pages.  Per the APM:    The CR3 register points to the base address of the page-directory-pointer   table. The page-directory-pointer table is aligned on a 32-byte boundary,   with the low 5 address bits 4:0 assumed to be 0.  And the SDM's much more explicit:    4:0    Ignored  Note, KVM gets this right when loading PDPTRs, it's only the nSVM flow that is broken.(CVE-2024-50115)\n\nIn the Linux kernel, the following vulnerability has been resolved:  Bluetooth: ISO: Fix UAF on iso_sock_timeout  conn->sk maybe have been unlinked/freed while waiting for iso_conn_lock so this checks if the conn->sk is still valid by checking if it part of iso_sk_list.(CVE-2024-50124)\n\nIn the Linux kernel, the following vulnerability has been resolved:  bpf: Use raw_spinlock_t in ringbuf  The function __bpf_ringbuf_reserve is invoked from a tracepoint, which disables preemption. Using spinlock_t in this context can lead to a \"sleep in atomic\" warning in the RT variant. This issue is illustrated in the example below:  BUG: sleeping function called from invalid context at kernel/locking/spinlock_rt.c:48 in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 556208, name: test_progs preempt_count: 1, expected: 0 RCU nest depth: 1, expected: 1 INFO: lockdep is turned off. Preemption disabled at: [<ffffd33a5c88ea44>] migrate_enable+0xc0/0x39c CPU: 7 PID: 556208 Comm: test_progs Tainted: G Hardware name: Qualcomm SA8775P Ride (DT) Call trace:  dump_backtrace+0xac/0x130  show_stack+0x1c/0x30  dump_stack_lvl+0xac/0xe8  dump_stack+0x18/0x30  __might_resched+0x3bc/0x4fc  rt_spin_lock+0x8c/0x1a4  __bpf_ringbuf_reserve+0xc4/0x254  bpf_ringbuf_reserve_dynptr+0x5c/0xdc  bpf_prog_ac3d15160d62622a_test_read_write+0x104/0x238  trace_call_bpf+0x238/0x774  perf_call_bpf_enter.isra.0+0x104/0x194  perf_syscall_enter+0x2f8/0x510  trace_sys_enter+0x39c/0x564  syscall_trace_enter+0x220/0x3c0  do_el0_svc+0x138/0x1dc  el0_svc+0x54/0x130  el0t_64_sync_handler+0x134/0x150  el0t_64_sync+0x17c/0x180  Switch the spinlock to raw_spinlock_t to avoid this error.(CVE-2024-50138)\n\n(CVE-2024-50151)\n\nIn the Linux kernel, the following vulnerability has been resolved:  scsi: target: core: Fix null-ptr-deref in target_alloc_device()  There is a null-ptr-deref issue reported by KASAN:  BUG: KASAN: null-ptr-deref in target_alloc_device+0xbc4/0xbe0 [target_core_mod] ...  kasan_report+0xb9/0xf0  target_alloc_device+0xbc4/0xbe0 [target_core_mod]  core_dev_setup_virtual_lun0+0xef/0x1f0 [target_core_mod]  target_core_init_configfs+0x205/0x420 [target_core_mod]  do_one_initcall+0xdd/0x4e0 ...  entry_SYSCALL_64_after_hwframe+0x76/0x7e  In target_alloc_device(), if allocing memory for dev queues fails, then dev will be freed by dev->transport->free_device(), but dev->transport is not initialized at that time, which will lead to a null pointer reference problem.  Fixing this bug by freeing dev with hba->backend->ops->free_device().(CVE-2024-50153)\n\nIn the Linux kernel, the following vulnerability has been resolved:  fbdev: sisfb: Fix strbuf array overflow  The values of the variables xres and yres are placed in strbuf. These variables are obtained from strbuf1. The strbuf1 array contains digit characters and a space if the array contains non-digit characters. Then, when executing sprintf(strbuf, \"%ux%ux8\", xres, yres); more than 16 bytes will be written to strbuf. It is suggested to increase the size of the strbuf array to 24.  Found by Linux Verification Center (linuxtesting.org) with SVACE.(CVE-2024-50180)\n\nIn the Linux kernel, the following vulnerability has been resolved:  x86/entry_32: Clear CPU buffers after register restore in NMI return  CPU buffers are currently cleared after call to exc_nmi, but before register state is restored. This may be okay for MDS mitigation but not for RDFS. Because RDFS mitigation requires CPU buffers to be cleared when registers don't have any sensitive data.  Move CLEAR_CPU_BUFFERS after RESTORE_ALL_NMI.(CVE-2024-50193)\n\nIn the Linux kernel, the following vulnerability has been resolved:  iio: light: veml6030: fix IIO device retrieval from embedded device  The dev pointer that is received as an argument in the in_illuminance_period_available_show function references the device embedded in the IIO device, not in the i2c client.  dev_to_iio_dev() must be used to accessthe right data. The current implementation leads to a segmentation fault on every attempt to read the attribute because indio_dev gets a NULL assignment.  This bug has been present since the first appearance of the driver, apparently since the last version (V6) before getting applied. A constant attribute was used until then, and the last modifications might have not been tested again.(CVE-2024-50198)\n\nIn the Linux kernel, the following vulnerability has been resolved:  nilfs2: propagate directory read errors from nilfs_find_entry()  Syzbot reported that a task hang occurs in vcs_open() during a fuzzing test for nilfs2.  The root cause of this problem is that in nilfs_find_entry(), which searches for directory entries, ignores errors when loading a directory page/folio via nilfs_get_folio() fails.  If the filesystem images is corrupted, and the i_size of the directory inode is large, and the directory page/folio is successfully read but fails the sanity check, for example when it is zero-filled, nilfs_check_folio() may continue to spit out error messages in bursts.  Fix this issue by propagating the error to the callers when loading a page/folio fails in nilfs_find_entry().  The current interface of nilfs_find_entry() and its callers is outdated and cannot propagate error codes such as -EIO and -ENOMEM returned via nilfs_find_entry(), so fix it together.(CVE-2024-50202)\n\nIn the Linux kernel, the following vulnerability has been resolved:  nvmet-auth: assign dh_key to NULL after kfree_sensitive  ctrl->dh_key might be used across multiple calls to nvmet_setup_dhgroup() for the same controller. So it's better to nullify it after release on error path in order to avoid double free later in nvmet_destroy_auth().  Found by Linux Verification Center (linuxtesting.org) with Svace.(CVE-2024-50215)\n\nIn the Linux kernel, the following vulnerability has been resolved:  wifi: mac80211: do not pass a stopped vif to the driver in .get_txpower  Avoid potentially crashing in the driver because of uninitialized private data(CVE-2024-50237)\n\nIn the Linux kernel, the following vulnerability has been resolved:  fs/ntfs3: Additional check in ntfs_file_release(CVE-2024-50242)\n\nIn the Linux kernel, the following vulnerability has been resolved:  fs/ntfs3: Fix general protection fault in run_is_mapped_full  Fixed deleating of a non-resident attribute in ntfs_create_inode() rollback.(CVE-2024-50243)\n\nIn the Linux kernel, the following vulnerability has been resolved:  fs/ntfs3: Additional check in ni_clear()  Checking of NTFS_FLAGS_LOG_REPLAYING added to prevent access to uninitialized bitmap during replay process.(CVE-2024-50244)\n\nIn the Linux kernel, the following vulnerability has been resolved:  fs/ntfs3: Fix possible deadlock in mi_read  Mutex lock with another subclass used in ni_lock_dir().(CVE-2024-50245)\n\nIn the Linux kernel, the following vulnerability has been resolved:  fs/ntfs3: Add rough attr alloc_size check(CVE-2024-50246)\n\nIn the Linux kernel, the following vulnerability has been resolved:  fs/ntfs3: Check if more than chunk-size bytes are written  A incorrectly formatted chunk may decompress into more than LZNT_CHUNK_SIZE bytes and a index out of bounds will occur in s_max_off.(CVE-2024-50247)\n\nIn the Linux kernel, the following vulnerability has been resolved:  fsdax: dax_unshare_iter needs to copy entire blocks  The code that copies data from srcmap to iomap in dax_unshare_iter is very very broken, which bfoster's recent fsx changes have exposed.  If the pos and len passed to dax_file_unshare are not aligned to an fsblock boundary, the iter pos and length in the _iter function will reflect this unalignment.  dax_iomap_direct_access always returns a pointer to the start of the kmapped fsdax page, even if its pos argument is in the middle of that page.  This is catastrophic for data integrity when iter->pos is not aligned to a page, because daddr/saddr do not point to the same byte in the file as iter->pos.  Hence we corrupt user data by copying it to the wrong place.  If iter->pos + iomap_length() in the _iter function not aligned to a page, then we fail to copy a full block, and only partially populate the destination block.  This is catastrophic for data confidentiality because we expose stale pmem contents.  Fix both of these issues by aligning copy_pos/copy_len to a page boundary (remember, this is fsdax so 1 fsblock == 1 base page) so that we always copy full blocks.  We're not done yet -- there's no call to invalidate_inode_pages2_range, so programs that have the file range mmap'd will continue accessing the old memory mapping after the file metadata updates have completed.  Be careful with the return value -- if the unshare succeeds, we still need to return the number of bytes that the iomap iter thinks we're operating on.(CVE-2024-50250)",
				"category":"general",
				"title":"Description"
			},
			{
				"text":"An update for kernel is now available for openEuler-24.03-LTS.\n\nopenEuler Security has rated this update as having a security impact of high. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.",
				"category":"general",
				"title":"Topic"
			},
			{
				"text":"High",
				"category":"general",
				"title":"Severity"
			},
			{
				"text":"kernel",
				"category":"general",
				"title":"Affected Component"
			}
		],
		"publisher":{
			"issuing_authority":"openEuler security committee",
			"name":"openEuler",
			"namespace":"https://www.openeuler.org",
			"contact_details":"openeuler-security@openeuler.org",
			"category":"vendor"
		},
		"references":[
			{
				"summary":"openEuler-SA-2024-2446",
				"category":"self",
				"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2446"
			},
			{
				"summary":"CVE-2024-26944",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-26944&packageName=kernel"
			},
			{
				"summary":"CVE-2024-36011",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-36011&packageName=kernel"
			},
			{
				"summary":"CVE-2024-43835",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-43835&packageName=kernel"
			},
			{
				"summary":"CVE-2024-43911",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-43911&packageName=kernel"
			},
			{
				"summary":"CVE-2024-44989",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-44989&packageName=kernel"
			},
			{
				"summary":"CVE-2024-45030",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-45030&packageName=kernel"
			},
			{
				"summary":"CVE-2024-46678",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-46678&packageName=kernel"
			},
			{
				"summary":"CVE-2024-46763",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-46763&packageName=kernel"
			},
			{
				"summary":"CVE-2024-46783",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-46783&packageName=kernel"
			},
			{
				"summary":"CVE-2024-46835",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-46835&packageName=kernel"
			},
			{
				"summary":"CVE-2024-47666",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-47666&packageName=kernel"
			},
			{
				"summary":"CVE-2024-47674",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-47674&packageName=kernel"
			},
			{
				"summary":"CVE-2024-47723",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-47723&packageName=kernel"
			},
			{
				"summary":"CVE-2024-47728",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-47728&packageName=kernel"
			},
			{
				"summary":"CVE-2024-49945",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-49945&packageName=kernel"
			},
			{
				"summary":"CVE-2024-50056",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-50056&packageName=kernel"
			},
			{
				"summary":"CVE-2024-50061",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-50061&packageName=kernel"
			},
			{
				"summary":"CVE-2024-50089",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-50089&packageName=kernel"
			},
			{
				"summary":"CVE-2024-50099",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-50099&packageName=kernel"
			},
			{
				"summary":"CVE-2024-50115",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-50115&packageName=kernel"
			},
			{
				"summary":"CVE-2024-50124",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-50124&packageName=kernel"
			},
			{
				"summary":"CVE-2024-50138",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-50138&packageName=kernel"
			},
			{
				"summary":"CVE-2024-50151",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-50151&packageName=kernel"
			},
			{
				"summary":"CVE-2024-50153",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-50153&packageName=kernel"
			},
			{
				"summary":"CVE-2024-50180",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-50180&packageName=kernel"
			},
			{
				"summary":"CVE-2024-50193",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-50193&packageName=kernel"
			},
			{
				"summary":"CVE-2024-50198",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-50198&packageName=kernel"
			},
			{
				"summary":"CVE-2024-50202",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-50202&packageName=kernel"
			},
			{
				"summary":"CVE-2024-50215",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-50215&packageName=kernel"
			},
			{
				"summary":"CVE-2024-50237",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-50237&packageName=kernel"
			},
			{
				"summary":"CVE-2024-50242",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-50242&packageName=kernel"
			},
			{
				"summary":"CVE-2024-50243",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-50243&packageName=kernel"
			},
			{
				"summary":"CVE-2024-50244",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-50244&packageName=kernel"
			},
			{
				"summary":"CVE-2024-50245",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-50245&packageName=kernel"
			},
			{
				"summary":"CVE-2024-50246",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-50246&packageName=kernel"
			},
			{
				"summary":"CVE-2024-50247",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-50247&packageName=kernel"
			},
			{
				"summary":"CVE-2024-50250",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-50250&packageName=kernel"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-26944"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-36011"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-43835"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-43911"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-44989"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-45030"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-46678"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-46763"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-46783"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-46835"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-47666"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-47674"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-47723"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-47728"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-49945"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50056"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50061"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50089"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50099"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50115"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50124"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50138"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50151"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50153"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50180"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50193"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50198"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50202"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50215"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50237"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50242"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50243"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50244"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50245"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50246"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50247"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50250"
			},
			{
				"summary":"openEuler-SA-2024-2446 vex file",
				"category":"self",
				"url":"https://repo.openeuler.org/security/data/csaf/advisories/2024/csaf-openeuler-sa-2024-2446.json"
			}
		],
		"title":"An update for kernel is now available for openEuler-24.03-LTS",
		"tracking":{
			"initial_release_date":"2024-11-22T22:22:34+08:00",
			"revision_history":[
				{
					"date":"2024-11-22T22:22:34+08:00",
					"summary":"Initial",
					"number":"1.0.0"
				}
			],
			"generator":{
				"date":"2024-11-22T22:22:34+08:00",
				"engine":{
					"name":"openEuler CSAF Tool V1.0"
				}
			},
			"current_release_date":"2024-11-22T22:22:34+08:00",
			"id":"openEuler-SA-2024-2446",
			"version":"1.0.0",
			"status":"final"
		}
	},
	"product_tree":{
		"branches":[
			{
				"name":"openEuler",
				"category":"vendor",
				"branches":[
					{
						"name":"openEuler",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"openEuler-24.03-LTS",
									"name":"openEuler-24.03-LTS"
								},
								"name":"openEuler-24.03-LTS",
								"category":"product_version"
							}
						],
						"category":"product_name"
					},
					{
						"name":"aarch64",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"bpftool-6.6.0-55.0.0.58.oe2403.aarch64.rpm",
									"name":"bpftool-6.6.0-55.0.0.58.oe2403.aarch64.rpm"
								},
								"name":"bpftool-6.6.0-55.0.0.58.oe2403.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64.rpm",
									"name":"bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64.rpm"
								},
								"name":"bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-6.6.0-55.0.0.58.oe2403.aarch64.rpm",
									"name":"kernel-6.6.0-55.0.0.58.oe2403.aarch64.rpm"
								},
								"name":"kernel-6.6.0-55.0.0.58.oe2403.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64.rpm",
									"name":"kernel-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64.rpm"
								},
								"name":"kernel-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-debugsource-6.6.0-55.0.0.58.oe2403.aarch64.rpm",
									"name":"kernel-debugsource-6.6.0-55.0.0.58.oe2403.aarch64.rpm"
								},
								"name":"kernel-debugsource-6.6.0-55.0.0.58.oe2403.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-devel-6.6.0-55.0.0.58.oe2403.aarch64.rpm",
									"name":"kernel-devel-6.6.0-55.0.0.58.oe2403.aarch64.rpm"
								},
								"name":"kernel-devel-6.6.0-55.0.0.58.oe2403.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-headers-6.6.0-55.0.0.58.oe2403.aarch64.rpm",
									"name":"kernel-headers-6.6.0-55.0.0.58.oe2403.aarch64.rpm"
								},
								"name":"kernel-headers-6.6.0-55.0.0.58.oe2403.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-source-6.6.0-55.0.0.58.oe2403.aarch64.rpm",
									"name":"kernel-source-6.6.0-55.0.0.58.oe2403.aarch64.rpm"
								},
								"name":"kernel-source-6.6.0-55.0.0.58.oe2403.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-tools-6.6.0-55.0.0.58.oe2403.aarch64.rpm",
									"name":"kernel-tools-6.6.0-55.0.0.58.oe2403.aarch64.rpm"
								},
								"name":"kernel-tools-6.6.0-55.0.0.58.oe2403.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64.rpm",
									"name":"kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64.rpm"
								},
								"name":"kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-tools-devel-6.6.0-55.0.0.58.oe2403.aarch64.rpm",
									"name":"kernel-tools-devel-6.6.0-55.0.0.58.oe2403.aarch64.rpm"
								},
								"name":"kernel-tools-devel-6.6.0-55.0.0.58.oe2403.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"perf-6.6.0-55.0.0.58.oe2403.aarch64.rpm",
									"name":"perf-6.6.0-55.0.0.58.oe2403.aarch64.rpm"
								},
								"name":"perf-6.6.0-55.0.0.58.oe2403.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64.rpm",
									"name":"perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64.rpm"
								},
								"name":"perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"python3-perf-6.6.0-55.0.0.58.oe2403.aarch64.rpm",
									"name":"python3-perf-6.6.0-55.0.0.58.oe2403.aarch64.rpm"
								},
								"name":"python3-perf-6.6.0-55.0.0.58.oe2403.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64.rpm",
									"name":"python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64.rpm"
								},
								"name":"python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64.rpm",
								"category":"product_version"
							}
						],
						"category":"architecture"
					},
					{
						"name":"x86_64",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"bpftool-6.6.0-55.0.0.58.oe2403.x86_64.rpm",
									"name":"bpftool-6.6.0-55.0.0.58.oe2403.x86_64.rpm"
								},
								"name":"bpftool-6.6.0-55.0.0.58.oe2403.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64.rpm",
									"name":"bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64.rpm"
								},
								"name":"bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-6.6.0-55.0.0.58.oe2403.x86_64.rpm",
									"name":"kernel-6.6.0-55.0.0.58.oe2403.x86_64.rpm"
								},
								"name":"kernel-6.6.0-55.0.0.58.oe2403.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64.rpm",
									"name":"kernel-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64.rpm"
								},
								"name":"kernel-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-debugsource-6.6.0-55.0.0.58.oe2403.x86_64.rpm",
									"name":"kernel-debugsource-6.6.0-55.0.0.58.oe2403.x86_64.rpm"
								},
								"name":"kernel-debugsource-6.6.0-55.0.0.58.oe2403.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-devel-6.6.0-55.0.0.58.oe2403.x86_64.rpm",
									"name":"kernel-devel-6.6.0-55.0.0.58.oe2403.x86_64.rpm"
								},
								"name":"kernel-devel-6.6.0-55.0.0.58.oe2403.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-headers-6.6.0-55.0.0.58.oe2403.x86_64.rpm",
									"name":"kernel-headers-6.6.0-55.0.0.58.oe2403.x86_64.rpm"
								},
								"name":"kernel-headers-6.6.0-55.0.0.58.oe2403.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-source-6.6.0-55.0.0.58.oe2403.x86_64.rpm",
									"name":"kernel-source-6.6.0-55.0.0.58.oe2403.x86_64.rpm"
								},
								"name":"kernel-source-6.6.0-55.0.0.58.oe2403.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-tools-6.6.0-55.0.0.58.oe2403.x86_64.rpm",
									"name":"kernel-tools-6.6.0-55.0.0.58.oe2403.x86_64.rpm"
								},
								"name":"kernel-tools-6.6.0-55.0.0.58.oe2403.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64.rpm",
									"name":"kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64.rpm"
								},
								"name":"kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-tools-devel-6.6.0-55.0.0.58.oe2403.x86_64.rpm",
									"name":"kernel-tools-devel-6.6.0-55.0.0.58.oe2403.x86_64.rpm"
								},
								"name":"kernel-tools-devel-6.6.0-55.0.0.58.oe2403.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"perf-6.6.0-55.0.0.58.oe2403.x86_64.rpm",
									"name":"perf-6.6.0-55.0.0.58.oe2403.x86_64.rpm"
								},
								"name":"perf-6.6.0-55.0.0.58.oe2403.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64.rpm",
									"name":"perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64.rpm"
								},
								"name":"perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"python3-perf-6.6.0-55.0.0.58.oe2403.x86_64.rpm",
									"name":"python3-perf-6.6.0-55.0.0.58.oe2403.x86_64.rpm"
								},
								"name":"python3-perf-6.6.0-55.0.0.58.oe2403.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64.rpm",
									"name":"python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64.rpm"
								},
								"name":"python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64.rpm",
								"category":"product_version"
							}
						],
						"category":"architecture"
					},
					{
						"name":"src",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-6.6.0-55.0.0.58.oe2403.src.rpm",
									"name":"kernel-6.6.0-55.0.0.58.oe2403.src.rpm"
								},
								"name":"kernel-6.6.0-55.0.0.58.oe2403.src.rpm",
								"category":"product_version"
							}
						],
						"category":"architecture"
					}
				]
			}
		],
		"relationships":[
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"bpftool-6.6.0-55.0.0.58.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.aarch64",
					"name":"bpftool-6.6.0-55.0.0.58.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"name":"bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-6.6.0-55.0.0.58.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.aarch64",
					"name":"kernel-6.6.0-55.0.0.58.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"name":"kernel-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-debugsource-6.6.0-55.0.0.58.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.aarch64",
					"name":"kernel-debugsource-6.6.0-55.0.0.58.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-devel-6.6.0-55.0.0.58.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.aarch64",
					"name":"kernel-devel-6.6.0-55.0.0.58.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-headers-6.6.0-55.0.0.58.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.aarch64",
					"name":"kernel-headers-6.6.0-55.0.0.58.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-source-6.6.0-55.0.0.58.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.aarch64",
					"name":"kernel-source-6.6.0-55.0.0.58.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-tools-6.6.0-55.0.0.58.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.aarch64",
					"name":"kernel-tools-6.6.0-55.0.0.58.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"name":"kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-tools-devel-6.6.0-55.0.0.58.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.aarch64",
					"name":"kernel-tools-devel-6.6.0-55.0.0.58.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"perf-6.6.0-55.0.0.58.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.aarch64",
					"name":"perf-6.6.0-55.0.0.58.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"name":"perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"python3-perf-6.6.0-55.0.0.58.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.aarch64",
					"name":"python3-perf-6.6.0-55.0.0.58.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"name":"python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"bpftool-6.6.0-55.0.0.58.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.x86_64",
					"name":"bpftool-6.6.0-55.0.0.58.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"name":"bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-6.6.0-55.0.0.58.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.x86_64",
					"name":"kernel-6.6.0-55.0.0.58.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"name":"kernel-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-debugsource-6.6.0-55.0.0.58.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.x86_64",
					"name":"kernel-debugsource-6.6.0-55.0.0.58.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-devel-6.6.0-55.0.0.58.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.x86_64",
					"name":"kernel-devel-6.6.0-55.0.0.58.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-headers-6.6.0-55.0.0.58.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.x86_64",
					"name":"kernel-headers-6.6.0-55.0.0.58.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-source-6.6.0-55.0.0.58.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.x86_64",
					"name":"kernel-source-6.6.0-55.0.0.58.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-tools-6.6.0-55.0.0.58.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.x86_64",
					"name":"kernel-tools-6.6.0-55.0.0.58.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"name":"kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-tools-devel-6.6.0-55.0.0.58.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.x86_64",
					"name":"kernel-tools-devel-6.6.0-55.0.0.58.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"perf-6.6.0-55.0.0.58.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.x86_64",
					"name":"perf-6.6.0-55.0.0.58.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"name":"perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"python3-perf-6.6.0-55.0.0.58.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.x86_64",
					"name":"python3-perf-6.6.0-55.0.0.58.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"name":"python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-6.6.0-55.0.0.58.oe2403.src.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.src",
					"name":"kernel-6.6.0-55.0.0.58.oe2403.src as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			}
		]
	},
	"vulnerabilities":[
		{
			"cve":"CVE-2024-26944",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: zoned: fix use-after-free in do_zone_finish()\n\nShinichiro reported the following use-after-free triggered by the device\nreplace operation in fstests btrfs/070.\n\n BTRFS info (device nullb1): scrub: finished on devid 1 with status: 0\n ==================================================================\n BUG: KASAN: slab-use-after-free in do_zone_finish+0x91a/0xb90 [btrfs]\n Read of size 8 at addr ffff8881543c8060 by task btrfs-cleaner/3494007\n\n CPU: 0 PID: 3494007 Comm: btrfs-cleaner Tainted: G        W          6.8.0-rc5-kts #1\n Hardware name: Supermicro Super Server/X11SPi-TF, BIOS 3.3 02/21/2020\n Call Trace:\n  <TASK>\n  dump_stack_lvl+0x5b/0x90\n  print_report+0xcf/0x670\n  ? __virt_addr_valid+0x200/0x3e0\n  kasan_report+0xd8/0x110\n  ? do_zone_finish+0x91a/0xb90 [btrfs]\n  ? do_zone_finish+0x91a/0xb90 [btrfs]\n  do_zone_finish+0x91a/0xb90 [btrfs]\n  btrfs_delete_unused_bgs+0x5e1/0x1750 [btrfs]\n  ? __pfx_btrfs_delete_unused_bgs+0x10/0x10 [btrfs]\n  ? btrfs_put_root+0x2d/0x220 [btrfs]\n  ? btrfs_clean_one_deleted_snapshot+0x299/0x430 [btrfs]\n  cleaner_kthread+0x21e/0x380 [btrfs]\n  ? __pfx_cleaner_kthread+0x10/0x10 [btrfs]\n  kthread+0x2e3/0x3c0\n  ? __pfx_kthread+0x10/0x10\n  ret_from_fork+0x31/0x70\n  ? __pfx_kthread+0x10/0x10\n  ret_from_fork_asm+0x1b/0x30\n  </TASK>\n\n Allocated by task 3493983:\n  kasan_save_stack+0x33/0x60\n  kasan_save_track+0x14/0x30\n  __kasan_kmalloc+0xaa/0xb0\n  btrfs_alloc_device+0xb3/0x4e0 [btrfs]\n  device_list_add.constprop.0+0x993/0x1630 [btrfs]\n  btrfs_scan_one_device+0x219/0x3d0 [btrfs]\n  btrfs_control_ioctl+0x26e/0x310 [btrfs]\n  __x64_sys_ioctl+0x134/0x1b0\n  do_syscall_64+0x99/0x190\n  entry_SYSCALL_64_after_hwframe+0x6e/0x76\n\n Freed by task 3494056:\n  kasan_save_stack+0x33/0x60\n  kasan_save_track+0x14/0x30\n  kasan_save_free_info+0x3f/0x60\n  poison_slab_object+0x102/0x170\n  __kasan_slab_free+0x32/0x70\n  kfree+0x11b/0x320\n  btrfs_rm_dev_replace_free_srcdev+0xca/0x280 [btrfs]\n  btrfs_dev_replace_finishing+0xd7e/0x14f0 [btrfs]\n  btrfs_dev_replace_by_ioctl+0x1286/0x25a0 [btrfs]\n  btrfs_ioctl+0xb27/0x57d0 [btrfs]\n  __x64_sys_ioctl+0x134/0x1b0\n  do_syscall_64+0x99/0x190\n  entry_SYSCALL_64_after_hwframe+0x6e/0x76\n\n The buggy address belongs to the object at ffff8881543c8000\n  which belongs to the cache kmalloc-1k of size 1024\n The buggy address is located 96 bytes inside of\n  freed 1024-byte region [ffff8881543c8000, ffff8881543c8400)\n\n The buggy address belongs to the physical page:\n page:00000000fe2c1285 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1543c8\n head:00000000fe2c1285 order:3 entire_mapcount:0 nr_pages_mapped:0 pincount:0\n flags: 0x17ffffc0000840(slab|head|node=0|zone=2|lastcpupid=0x1fffff)\n page_type: 0xffffffff()\n raw: 0017ffffc0000840 ffff888100042dc0 ffffea0019e8f200 dead000000000002\n raw: 0000000000000000 0000000000100010 00000001ffffffff 0000000000000000\n page dumped because: kasan: bad access detected\n\n Memory state around the buggy address:\n  ffff8881543c7f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00\n  ffff8881543c7f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00\n >ffff8881543c8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb\n                                                        ^\n  ffff8881543c8080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb\n  ffff8881543c8100: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb\n\nThis UAF happens because we're accessing stale zone information of a\nalready removed btrfs_device in do_zone_finish().\n\nThe sequence of events is as follows:\n\nbtrfs_dev_replace_start\n  btrfs_scrub_dev\n   btrfs_dev_replace_finishing\n    btrfs_dev_replace_update_device_in_mapping_tree <-- devices replaced\n    btrfs_rm_dev_replace_free_srcdev\n     btrfs_free_device                              <-- device freed\n\ncleaner_kthread\n btrfs_delete_unused_bgs\n  btrfs_zone_finish\n   do_zone_finish              <-- refers the freed device\n\nThe reason for this is that we're using a\n---truncated---",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2446"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-26944"
		},
		{
			"cve":"CVE-2024-36011",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: HCI: Fix potential null-ptr-deref\n\nFix potential null-ptr-deref in hci_le_big_sync_established_evt().",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2446"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"LOW",
						"baseScore":3.9,
						"vectorString":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Low",
					"category":"impact"
				}
			],
			"title":"CVE-2024-36011"
		},
		{
			"cve":"CVE-2024-43835",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nvirtio_net: Fix napi_skb_cache_put warning\n\nAfter the commit bdacf3e34945 (\"net: Use nested-BH locking for\nnapi_alloc_cache.\") was merged, the following warning began to appear:\n\n\t WARNING: CPU: 5 PID: 1 at net/core/skbuff.c:1451 napi_skb_cache_put+0x82/0x4b0\n\n\t  __warn+0x12f/0x340\n\t  napi_skb_cache_put+0x82/0x4b0\n\t  napi_skb_cache_put+0x82/0x4b0\n\t  report_bug+0x165/0x370\n\t  handle_bug+0x3d/0x80\n\t  exc_invalid_op+0x1a/0x50\n\t  asm_exc_invalid_op+0x1a/0x20\n\t  __free_old_xmit+0x1c8/0x510\n\t  napi_skb_cache_put+0x82/0x4b0\n\t  __free_old_xmit+0x1c8/0x510\n\t  __free_old_xmit+0x1c8/0x510\n\t  __pfx___free_old_xmit+0x10/0x10\n\nThe issue arises because virtio is assuming it's running in NAPI context\neven when it's not, such as in the netpoll case.\n\nTo resolve this, modify virtnet_poll_tx() to only set NAPI when budget\nis available. Same for virtnet_poll_cleantx(), which always assumed that\nit was in a NAPI context.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2446"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-43835"
		},
		{
			"cve":"CVE-2024-43911",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: mac80211: fix NULL dereference at band check in starting tx ba session\n\nIn MLD connection, link_data/link_conf are dynamically allocated. They\ndon't point to vif->bss_conf. So, there will be no chanreq assigned to\nvif->bss_conf and then the chan will be NULL. Tweak the code to check\nht_supported/vht_supported/has_he/has_eht on sta deflink.\n\nCrash log (with rtw89 version under MLO development):\n[ 9890.526087] BUG: kernel NULL pointer dereference, address: 0000000000000000\n[ 9890.526102] #PF: supervisor read access in kernel mode\n[ 9890.526105] #PF: error_code(0x0000) - not-present page\n[ 9890.526109] PGD 0 P4D 0\n[ 9890.526114] Oops: 0000 [#1] PREEMPT SMP PTI\n[ 9890.526119] CPU: 2 PID: 6367 Comm: kworker/u16:2 Kdump: loaded Tainted: G           OE      6.9.0 #1\n[ 9890.526123] Hardware name: LENOVO 2356AD1/2356AD1, BIOS G7ETB3WW (2.73 ) 11/28/2018\n[ 9890.526126] Workqueue: phy2 rtw89_core_ba_work [rtw89_core]\n[ 9890.526203] RIP: 0010:ieee80211_start_tx_ba_session (net/mac80211/agg-tx.c:618 (discriminator 1)) mac80211\n[ 9890.526279] Code: f7 e8 d5 93 3e ea 48 83 c4 28 89 d8 5b 41 5c 41 5d 41 5e 41 5f 5d c3 cc cc cc cc 49 8b 84 24 e0 f1 ff ff 48 8b 80 90 1b 00 00 <83> 38 03 0f 84 37 fe ff ff bb ea ff ff ff eb cc 49 8b 84 24 10 f3\nAll code\n========\n   0:\tf7 e8                \timul   %eax\n   2:\td5                   \t(bad)\n   3:\t93                   \txchg   %eax,%ebx\n   4:\t3e ea                \tds (bad)\n   6:\t48 83 c4 28          \tadd    $0x28,%rsp\n   a:\t89 d8                \tmov    %ebx,%eax\n   c:\t5b                   \tpop    %rbx\n   d:\t41 5c                \tpop    %r12\n   f:\t41 5d                \tpop    %r13\n  11:\t41 5e                \tpop    %r14\n  13:\t41 5f                \tpop    %r15\n  15:\t5d                   \tpop    %rbp\n  16:\tc3                   \tretq\n  17:\tcc                   \tint3\n  18:\tcc                   \tint3\n  19:\tcc                   \tint3\n  1a:\tcc                   \tint3\n  1b:\t49 8b 84 24 e0 f1 ff \tmov    -0xe20(%r12),%rax\n  22:\tff\n  23:\t48 8b 80 90 1b 00 00 \tmov    0x1b90(%rax),%rax\n  2a:*\t83 38 03             \tcmpl   $0x3,(%rax)\t\t<-- trapping instruction\n  2d:\t0f 84 37 fe ff ff    \tje     0xfffffffffffffe6a\n  33:\tbb ea ff ff ff       \tmov    $0xffffffea,%ebx\n  38:\teb cc                \tjmp    0x6\n  3a:\t49                   \trex.WB\n  3b:\t8b                   \t.byte 0x8b\n  3c:\t84 24 10             \ttest   %ah,(%rax,%rdx,1)\n  3f:\tf3                   \trepz\n\nCode starting with the faulting instruction\n===========================================\n   0:\t83 38 03             \tcmpl   $0x3,(%rax)\n   3:\t0f 84 37 fe ff ff    \tje     0xfffffffffffffe40\n   9:\tbb ea ff ff ff       \tmov    $0xffffffea,%ebx\n   e:\teb cc                \tjmp    0xffffffffffffffdc\n  10:\t49                   \trex.WB\n  11:\t8b                   \t.byte 0x8b\n  12:\t84 24 10             \ttest   %ah,(%rax,%rdx,1)\n  15:\tf3                   \trepz\n[ 9890.526285] RSP: 0018:ffffb8db09013d68 EFLAGS: 00010246\n[ 9890.526291] RAX: 0000000000000000 RBX: 0000000000000000 RCX: ffff9308e0d656c8\n[ 9890.526295] RDX: 0000000000000000 RSI: ffffffffab99460b RDI: ffffffffab9a7685\n[ 9890.526300] RBP: ffffb8db09013db8 R08: 0000000000000000 R09: 0000000000000873\n[ 9890.526304] R10: ffff9308e0d64800 R11: 0000000000000002 R12: ffff9308e5ff6e70\n[ 9890.526308] R13: ffff930952500e20 R14: ffff9309192a8c00 R15: 0000000000000000\n[ 9890.526313] FS:  0000000000000000(0000) GS:ffff930b4e700000(0000) knlGS:0000000000000000\n[ 9890.526316] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ 9890.526318] CR2: 0000000000000000 CR3: 0000000391c58005 CR4: 00000000001706f0\n[ 9890.526321] Call Trace:\n[ 9890.526324]  <TASK>\n[ 9890.526327] ? show_regs (arch/x86/kernel/dumpstack.c:479)\n[ 9890.526335] ? __die (arch/x86/kernel/dumpstack.c:421 arch/x86/kernel/dumpstack.c:434)\n[ 9890.526340] ? page_fault_oops (arch/x86/mm/fault.c:713)\n[ 9890.526347] ? search_module_extables (kernel/module/main.c:3256 (discriminator\n---truncated---",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2446"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-43911"
		},
		{
			"cve":"CVE-2024-44989",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nbonding: fix xfrm real_dev null pointer dereference\n\nWe shouldn't set real_dev to NULL because packets can be in transit and\nxfrm might call xdo_dev_offload_ok() in parallel. All callbacks assume\nreal_dev is set.\n\n Example trace:\n kernel: BUG: unable to handle page fault for address: 0000000000001030\n kernel: bond0: (slave eni0np1): making interface the new active one\n kernel: #PF: supervisor write access in kernel mode\n kernel: #PF: error_code(0x0002) - not-present page\n kernel: PGD 0 P4D 0\n kernel: Oops: 0002 [#1] PREEMPT SMP\n kernel: CPU: 4 PID: 2237 Comm: ping Not tainted 6.7.7+ #12\n kernel: Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-2.fc40 04/01/2014\n kernel: RIP: 0010:nsim_ipsec_offload_ok+0xc/0x20 [netdevsim]\n kernel: bond0: (slave eni0np1): bond_ipsec_add_sa_all: failed to add SA\n kernel: Code: e0 0f 0b 48 83 7f 38 00 74 de 0f 0b 48 8b 47 08 48 8b 37 48 8b 78 40 e9 b2 e5 9a d7 66 90 0f 1f 44 00 00 48 8b 86 80 02 00 00 <83> 80 30 10 00 00 01 b8 01 00 00 00 c3 0f 1f 80 00 00 00 00 0f 1f\n kernel: bond0: (slave eni0np1): making interface the new active one\n kernel: RSP: 0018:ffffabde81553b98 EFLAGS: 00010246\n kernel: bond0: (slave eni0np1): bond_ipsec_add_sa_all: failed to add SA\n kernel:\n kernel: RAX: 0000000000000000 RBX: ffff9eb404e74900 RCX: ffff9eb403d97c60\n kernel: RDX: ffffffffc090de10 RSI: ffff9eb404e74900 RDI: ffff9eb3c5de9e00\n kernel: RBP: ffff9eb3c0a42000 R08: 0000000000000010 R09: 0000000000000014\n kernel: R10: 7974203030303030 R11: 3030303030303030 R12: 0000000000000000\n kernel: R13: ffff9eb3c5de9e00 R14: ffffabde81553cc8 R15: ffff9eb404c53000\n kernel: FS:  00007f2a77a3ad00(0000) GS:ffff9eb43bd00000(0000) knlGS:0000000000000000\n kernel: CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n kernel: CR2: 0000000000001030 CR3: 00000001122ab000 CR4: 0000000000350ef0\n kernel: bond0: (slave eni0np1): making interface the new active one\n kernel: Call Trace:\n kernel:  <TASK>\n kernel:  ? __die+0x1f/0x60\n kernel: bond0: (slave eni0np1): bond_ipsec_add_sa_all: failed to add SA\n kernel:  ? page_fault_oops+0x142/0x4c0\n kernel:  ? do_user_addr_fault+0x65/0x670\n kernel:  ? kvm_read_and_reset_apf_flags+0x3b/0x50\n kernel: bond0: (slave eni0np1): making interface the new active one\n kernel:  ? exc_page_fault+0x7b/0x180\n kernel:  ? asm_exc_page_fault+0x22/0x30\n kernel:  ? nsim_bpf_uninit+0x50/0x50 [netdevsim]\n kernel: bond0: (slave eni0np1): bond_ipsec_add_sa_all: failed to add SA\n kernel:  ? nsim_ipsec_offload_ok+0xc/0x20 [netdevsim]\n kernel: bond0: (slave eni0np1): making interface the new active one\n kernel:  bond_ipsec_offload_ok+0x7b/0x90 [bonding]\n kernel:  xfrm_output+0x61/0x3b0\n kernel: bond0: (slave eni0np1): bond_ipsec_add_sa_all: failed to add SA\n kernel:  ip_push_pending_frames+0x56/0x80",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2446"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-44989"
		},
		{
			"cve":"CVE-2024-45030",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nigb: cope with large MAX_SKB_FRAGS\n\nSabrina reports that the igb driver does not cope well with large\nMAX_SKB_FRAG values: setting MAX_SKB_FRAG to 45 causes payload\ncorruption on TX.\n\nAn easy reproducer is to run ssh to connect to the machine.  With\nMAX_SKB_FRAGS=17 it works, with MAX_SKB_FRAGS=45 it fails.  This has\nbeen reported originally in\nhttps://bugzilla.redhat.com/show_bug.cgi?id=2265320\n\nThe root cause of the issue is that the driver does not take into\naccount properly the (possibly large) shared info size when selecting\nthe ring layout, and will try to fit two packets inside the same 4K\npage even when the 1st fraglist will trump over the 2nd head.\n\nAddress the issue by checking if 2K buffers are insufficient.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2446"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-45030"
		},
		{
			"cve":"CVE-2024-46678",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nbonding: change ipsec_lock from spin lock to mutex\n\nIn the cited commit, bond->ipsec_lock is added to protect ipsec_list,\nhence xdo_dev_state_add and xdo_dev_state_delete are called inside\nthis lock. As ipsec_lock is a spin lock and such xfrmdev ops may sleep,\n\"scheduling while atomic\" will be triggered when changing bond's\nactive slave.\n\n[  101.055189] BUG: scheduling while atomic: bash/902/0x00000200\n[  101.055726] Modules linked in:\n[  101.058211] CPU: 3 PID: 902 Comm: bash Not tainted 6.9.0-rc4+ #1\n[  101.058760] Hardware name:\n[  101.059434] Call Trace:\n[  101.059436]  <TASK>\n[  101.060873]  dump_stack_lvl+0x51/0x60\n[  101.061275]  __schedule_bug+0x4e/0x60\n[  101.061682]  __schedule+0x612/0x7c0\n[  101.062078]  ? __mod_timer+0x25c/0x370\n[  101.062486]  schedule+0x25/0xd0\n[  101.062845]  schedule_timeout+0x77/0xf0\n[  101.063265]  ? asm_common_interrupt+0x22/0x40\n[  101.063724]  ? __bpf_trace_itimer_state+0x10/0x10\n[  101.064215]  __wait_for_common+0x87/0x190\n[  101.064648]  ? usleep_range_state+0x90/0x90\n[  101.065091]  cmd_exec+0x437/0xb20 [mlx5_core]\n[  101.065569]  mlx5_cmd_do+0x1e/0x40 [mlx5_core]\n[  101.066051]  mlx5_cmd_exec+0x18/0x30 [mlx5_core]\n[  101.066552]  mlx5_crypto_create_dek_key+0xea/0x120 [mlx5_core]\n[  101.067163]  ? bonding_sysfs_store_option+0x4d/0x80 [bonding]\n[  101.067738]  ? kmalloc_trace+0x4d/0x350\n[  101.068156]  mlx5_ipsec_create_sa_ctx+0x33/0x100 [mlx5_core]\n[  101.068747]  mlx5e_xfrm_add_state+0x47b/0xaa0 [mlx5_core]\n[  101.069312]  bond_change_active_slave+0x392/0x900 [bonding]\n[  101.069868]  bond_option_active_slave_set+0x1c2/0x240 [bonding]\n[  101.070454]  __bond_opt_set+0xa6/0x430 [bonding]\n[  101.070935]  __bond_opt_set_notify+0x2f/0x90 [bonding]\n[  101.071453]  bond_opt_tryset_rtnl+0x72/0xb0 [bonding]\n[  101.071965]  bonding_sysfs_store_option+0x4d/0x80 [bonding]\n[  101.072567]  kernfs_fop_write_iter+0x10c/0x1a0\n[  101.073033]  vfs_write+0x2d8/0x400\n[  101.073416]  ? alloc_fd+0x48/0x180\n[  101.073798]  ksys_write+0x5f/0xe0\n[  101.074175]  do_syscall_64+0x52/0x110\n[  101.074576]  entry_SYSCALL_64_after_hwframe+0x4b/0x53\n\nAs bond_ipsec_add_sa_all and bond_ipsec_del_sa_all are only called\nfrom bond_change_active_slave, which requires holding the RTNL lock.\nAnd bond_ipsec_add_sa and bond_ipsec_del_sa are xfrm state\nxdo_dev_state_add and xdo_dev_state_delete APIs, which are in user\ncontext. So ipsec_lock doesn't have to be spin lock, change it to\nmutex, and thus the above issue can be resolved.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2446"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-46678"
		},
		{
			"cve":"CVE-2024-46763",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nfou: Fix null-ptr-deref in GRO.\n\nWe observed a null-ptr-deref in fou_gro_receive() while shutting down\na host.  [0]\n\nThe NULL pointer is sk->sk_user_data, and the offset 8 is of protocol\nin struct fou.\n\nWhen fou_release() is called due to netns dismantle or explicit tunnel\nteardown, udp_tunnel_sock_release() sets NULL to sk->sk_user_data.\nThen, the tunnel socket is destroyed after a single RCU grace period.\n\nSo, in-flight udp4_gro_receive() could find the socket and execute the\nFOU GRO handler, where sk->sk_user_data could be NULL.\n\nLet's use rcu_dereference_sk_user_data() in fou_from_sock() and add NULL\nchecks in FOU GRO handlers.\n\n[0]:\nBUG: kernel NULL pointer dereference, address: 0000000000000008\n PF: supervisor read access in kernel mode\n PF: error_code(0x0000) - not-present page\nPGD 80000001032f4067 P4D 80000001032f4067 PUD 103240067 PMD 0\nSMP PTI\nCPU: 0 PID: 0 Comm: swapper/0 Not tainted 5.10.216-204.855.amzn2.x86_64 #1\nHardware name: Amazon EC2 c5.large/, BIOS 1.0 10/16/2017\nRIP: 0010:fou_gro_receive (net/ipv4/fou.c:233) [fou]\nCode: 41 5f c3 cc cc cc cc e8 e7 2e 69 f4 0f 1f 80 00 00 00 00 0f 1f 44 00 00 49 89 f8 41 54 48 89 f7 48 89 d6 49 8b 80 88 02 00 00 <0f> b6 48 08 0f b7 42 4a 66 25 fd fd 80 cc 02 66 89 42 4a 0f b6 42\nRSP: 0018:ffffa330c0003d08 EFLAGS: 00010297\nRAX: 0000000000000000 RBX: ffff93d9e3a6b900 RCX: 0000000000000010\nRDX: ffff93d9e3a6b900 RSI: ffff93d9e3a6b900 RDI: ffff93dac2e24d08\nRBP: ffff93d9e3a6b900 R08: ffff93dacbce6400 R09: 0000000000000002\nR10: 0000000000000000 R11: ffffffffb5f369b0 R12: ffff93dacbce6400\nR13: ffff93dac2e24d08 R14: 0000000000000000 R15: ffffffffb4edd1c0\nFS:  0000000000000000(0000) GS:ffff93daee800000(0000) knlGS:0000000000000000\nCS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000000000000008 CR3: 0000000102140001 CR4: 00000000007706f0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nPKRU: 55555554\nCall Trace:\n <IRQ>\n ? show_trace_log_lvl (arch/x86/kernel/dumpstack.c:259)\n ? __die_body.cold (arch/x86/kernel/dumpstack.c:478 arch/x86/kernel/dumpstack.c:420)\n ? no_context (arch/x86/mm/fault.c:752)\n ? exc_page_fault (arch/x86/include/asm/irqflags.h:49 arch/x86/include/asm/irqflags.h:89 arch/x86/mm/fault.c:1435 arch/x86/mm/fault.c:1483)\n ? asm_exc_page_fault (arch/x86/include/asm/idtentry.h:571)\n ? fou_gro_receive (net/ipv4/fou.c:233) [fou]\n udp_gro_receive (include/linux/netdevice.h:2552 net/ipv4/udp_offload.c:559)\n udp4_gro_receive (net/ipv4/udp_offload.c:604)\n inet_gro_receive (net/ipv4/af_inet.c:1549 (discriminator 7))\n dev_gro_receive (net/core/dev.c:6035 (discriminator 4))\n napi_gro_receive (net/core/dev.c:6170)\n ena_clean_rx_irq (drivers/amazon/net/ena/ena_netdev.c:1558) [ena]\n ena_io_poll (drivers/amazon/net/ena/ena_netdev.c:1742) [ena]\n napi_poll (net/core/dev.c:6847)\n net_rx_action (net/core/dev.c:6917)\n __do_softirq (arch/x86/include/asm/jump_label.h:25 include/linux/jump_label.h:200 include/trace/events/irq.h:142 kernel/softirq.c:299)\n asm_call_irq_on_stack (arch/x86/entry/entry_64.S:809)\n</IRQ>\n do_softirq_own_stack (arch/x86/include/asm/irq_stack.h:27 arch/x86/include/asm/irq_stack.h:77 arch/x86/kernel/irq_64.c:77)\n irq_exit_rcu (kernel/softirq.c:393 kernel/softirq.c:423 kernel/softirq.c:435)\n common_interrupt (arch/x86/kernel/irq.c:239)\n asm_common_interrupt (arch/x86/include/asm/idtentry.h:626)\nRIP: 0010:acpi_idle_do_entry (arch/x86/include/asm/irqflags.h:49 arch/x86/include/asm/irqflags.h:89 drivers/acpi/processor_idle.c:114 drivers/acpi/processor_idle.c:575)\nCode: 8b 15 d1 3c c4 02 ed c3 cc cc cc cc 65 48 8b 04 25 40 ef 01 00 48 8b 00 a8 08 75 eb 0f 1f 44 00 00 0f 00 2d d5 09 55 00 fb f4 <fa> c3 cc cc cc cc e9 be fc ff ff 66 66 2e 0f 1f 84 00 00 00 00 00\nRSP: 0018:ffffffffb5603e58 EFLAGS: 00000246\nRAX: 0000000000004000 RBX: ffff93dac0929c00 RCX: ffff93daee833900\nRDX: ffff93daee800000 RSI: ffff93d\n---truncated---",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2446"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-46763"
		},
		{
			"cve":"CVE-2024-46783",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\ntcp_bpf: fix return value of tcp_bpf_sendmsg()\n\nWhen we cork messages in psock->cork, the last message triggers the\nflushing will result in sending a sk_msg larger than the current\nmessage size. In this case, in tcp_bpf_send_verdict(), 'copied' becomes\nnegative at least in the following case:\n\n468         case __SK_DROP:\n469         default:\n470                 sk_msg_free_partial(sk, msg, tosend);\n471                 sk_msg_apply_bytes(psock, tosend);\n472                 *copied -= (tosend + delta); // <==== HERE\n473                 return -EACCES;\n\nTherefore, it could lead to the following BUG with a proper value of\n'copied' (thanks to syzbot). We should not use negative 'copied' as a\nreturn value here.\n\n  ------------[ cut here ]------------\n  kernel BUG at net/socket.c:733!\n  Internal error: Oops - BUG: 00000000f2000800 [#1] PREEMPT SMP\n  Modules linked in:\n  CPU: 0 UID: 0 PID: 3265 Comm: syz-executor510 Not tainted 6.11.0-rc3-syzkaller-00060-gd07b43284ab3 #0\n  Hardware name: linux,dummy-virt (DT)\n  pstate: 61400009 (nZCv daif +PAN -UAO -TCO +DIT -SSBS BTYPE=--)\n  pc : sock_sendmsg_nosec net/socket.c:733 [inline]\n  pc : sock_sendmsg_nosec net/socket.c:728 [inline]\n  pc : __sock_sendmsg+0x5c/0x60 net/socket.c:745\n  lr : sock_sendmsg_nosec net/socket.c:730 [inline]\n  lr : __sock_sendmsg+0x54/0x60 net/socket.c:745\n  sp : ffff800088ea3b30\n  x29: ffff800088ea3b30 x28: fbf00000062bc900 x27: 0000000000000000\n  x26: ffff800088ea3bc0 x25: ffff800088ea3bc0 x24: 0000000000000000\n  x23: f9f00000048dc000 x22: 0000000000000000 x21: ffff800088ea3d90\n  x20: f9f00000048dc000 x19: ffff800088ea3d90 x18: 0000000000000001\n  x17: 0000000000000000 x16: 0000000000000000 x15: 000000002002ffaf\n  x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000\n  x11: 0000000000000000 x10: ffff8000815849c0 x9 : ffff8000815b49c0\n  x8 : 0000000000000000 x7 : 000000000000003f x6 : 0000000000000000\n  x5 : 00000000000007e0 x4 : fff07ffffd239000 x3 : fbf00000062bc900\n  x2 : 0000000000000000 x1 : 0000000000000000 x0 : 00000000fffffdef\n  Call trace:\n   sock_sendmsg_nosec net/socket.c:733 [inline]\n   __sock_sendmsg+0x5c/0x60 net/socket.c:745\n   ____sys_sendmsg+0x274/0x2ac net/socket.c:2597\n   ___sys_sendmsg+0xac/0x100 net/socket.c:2651\n   __sys_sendmsg+0x84/0xe0 net/socket.c:2680\n   __do_sys_sendmsg net/socket.c:2689 [inline]\n   __se_sys_sendmsg net/socket.c:2687 [inline]\n   __arm64_sys_sendmsg+0x24/0x30 net/socket.c:2687\n   __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline]\n   invoke_syscall+0x48/0x110 arch/arm64/kernel/syscall.c:49\n   el0_svc_common.constprop.0+0x40/0xe0 arch/arm64/kernel/syscall.c:132\n   do_el0_svc+0x1c/0x28 arch/arm64/kernel/syscall.c:151\n   el0_svc+0x34/0xec arch/arm64/kernel/entry-common.c:712\n   el0t_64_sync_handler+0x100/0x12c arch/arm64/kernel/entry-common.c:730\n   el0t_64_sync+0x19c/0x1a0 arch/arm64/kernel/entry.S:598\n  Code: f9404463 d63f0060 3108441f 54fffe81 (d4210000)\n  ---[ end trace 0000000000000000 ]---",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2446"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-46783"
		},
		{
			"cve":"CVE-2024-46835",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amdgpu: Fix smatch static checker warning\n\nadev->gfx.imu.funcs could be NULL",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2446"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-46835"
		},
		{
			"cve":"CVE-2024-47666",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: pm80xx: Set phy->enable_completion only when we wait for it\n\npm8001_phy_control() populates the enable_completion pointer with a stack\naddress, sends a PHY_LINK_RESET / PHY_HARD_RESET, waits 300 ms, and\nreturns. The problem arises when a phy control response comes late.  After\n300 ms the pm8001_phy_control() function returns and the passed\nenable_completion stack address is no longer valid. Late phy control\nresponse invokes complete() on a dangling enable_completion pointer which\nleads to a kernel crash.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2446"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-47666"
		},
		{
			"cve":"CVE-2024-47674",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nmm: avoid leaving partial pfn mappings around in error case\n\nAs Jann points out, PFN mappings are special, because unlike normal\nmemory mappings, there is no lifetime information associated with the\nmapping - it is just a raw mapping of PFNs with no reference counting of\na 'struct page'.\n\nThat's all very much intentional, but it does mean that it's easy to\nmess up the cleanup in case of errors.  Yes, a failed mmap() will always\neventually clean up any partial mappings, but without any explicit\nlifetime in the page table mapping itself, it's very easy to do the\nerror handling in the wrong order.\n\nIn particular, it's easy to mistakenly free the physical backing store\nbefore the page tables are actually cleaned up and (temporarily) have\nstale dangling PTE entries.\n\nTo make this situation less error-prone, just make sure that any partial\npfn mapping is torn down early, before any other error handling.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2446"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-47674"
		},
		{
			"cve":"CVE-2024-47723",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\njfs: fix out-of-bounds in dbNextAG() and diAlloc()\n\nIn dbNextAG() , there is no check for the case where bmp->db_numag is\ngreater or same than MAXAG due to a polluted image, which causes an\nout-of-bounds. Therefore, a bounds check should be added in dbMount().\n\nAnd in dbNextAG(), a check for the case where agpref is greater than\nbmp->db_numag should be added, so an out-of-bounds exception should be\nprevented.\n\nAdditionally, a check for the case where agno is greater or same than\nMAXAG should be added in diAlloc() to prevent out-of-bounds.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2446"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.1,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2024-47723"
		},
		{
			"cve":"CVE-2024-47728",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Zero former ARG_PTR_TO_{LONG,INT} args in case of error\n\nFor all non-tracing helpers which formerly had ARG_PTR_TO_{LONG,INT} as input\narguments, zero the value for the case of an error as otherwise it could leak\nmemory. For tracing, it is not needed given CAP_PERFMON can already read all\nkernel memory anyway hence bpf_get_func_arg() and bpf_get_func_ret() is skipped\nin here.\n\nAlso, the MTU helpers mtu_len pointer value is being written but also read.\nTechnically, the MEM_UNINIT should not be there in order to always force init.\nRemoving MEM_UNINIT needs more verifier rework though: MEM_UNINIT right now\nimplies two things actually: i) write into memory, ii) memory does not have\nto be initialized. If we lift MEM_UNINIT, it then becomes: i) read into memory,\nii) memory must be initialized. This means that for bpf_*_check_mtu() we're\nreadding the issue we're trying to fix, that is, it would then be able to\nwrite back into things like .rodata BPF maps. Follow-up work will rework the\nMEM_UNINIT semantics such that the intent can be better expressed. For now\njust clear the *mtu_len on error path which can be lifted later again.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2446"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-47728"
		},
		{
			"cve":"CVE-2024-49945",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nnet/ncsi: Disable the ncsi work before freeing the associated structure\n\nThe work function can run after the ncsi device is freed, resulting\nin use-after-free bugs or kernel panic.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2446"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-49945"
		},
		{
			"cve":"CVE-2024-50056",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nusb: gadget: uvc: Fix ERR_PTR dereference in uvc_v4l2.c\n\nFix potential dereferencing of ERR_PTR() in find_format_by_pix()\nand uvc_v4l2_enum_format().\n\nFix the following smatch errors:\n\ndrivers/usb/gadget/function/uvc_v4l2.c:124 find_format_by_pix()\nerror: 'fmtdesc' dereferencing possible ERR_PTR()\n\ndrivers/usb/gadget/function/uvc_v4l2.c:392 uvc_v4l2_enum_format()\nerror: 'fmtdesc' dereferencing possible ERR_PTR()\n\nAlso, fix similar issue in uvc_v4l2_try_format() for potential\ndereferencing of ERR_PTR().",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2446"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"LOW",
						"baseScore":3.9,
						"vectorString":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Low",
					"category":"impact"
				}
			],
			"title":"CVE-2024-50056"
		},
		{
			"cve":"CVE-2024-50061",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\ni3c: master: cdns: Fix use after free vulnerability in cdns_i3c_master Driver Due to Race Condition\n\nIn the cdns_i3c_master_probe function, &master->hj_work is bound with\ncdns_i3c_master_hj. And cdns_i3c_master_interrupt can call\ncnds_i3c_master_demux_ibis function to start the work.\n\nIf we remove the module which will call cdns_i3c_master_remove to\nmake cleanup, it will free master->base through i3c_master_unregister\nwhile the work mentioned above will be used. The sequence of operations\nthat may lead to a UAF bug is as follows:\n\nCPU0                                      CPU1\n\n                                     | cdns_i3c_master_hj\ncdns_i3c_master_remove               |\ni3c_master_unregister(&master->base) |\ndevice_unregister(&master->dev)      |\ndevice_release                       |\n//free master->base                  |\n                                     | i3c_master_do_daa(&master->base)\n                                     | //use master->base\n\nFix it by ensuring that the work is canceled before proceeding with\nthe cleanup in cdns_i3c_master_remove.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2446"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.0,
						"vectorString":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2024-50061"
		},
		{
			"cve":"CVE-2024-50089",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nunicode: Don't special case ignorable code points\n\nWe don't need to handle them separately. Instead, just let them\ndecompose/casefold to themselves.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2446"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-50089"
		},
		{
			"cve":"CVE-2024-50099",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\narm64: probes: Remove broken LDR (literal) uprobe support\n\nThe simulate_ldr_literal() and simulate_ldrsw_literal() functions are\nunsafe to use for uprobes. Both functions were originally written for\nuse with kprobes, and access memory with plain C accesses. When uprobes\nwas added, these were reused unmodified even though they cannot safely\naccess user memory.\n\nThere are three key problems:\n\n1) The plain C accesses do not have corresponding extable entries, and\n   thus if they encounter a fault the kernel will treat these as\n   unintentional accesses to user memory, resulting in a BUG() which\n   will kill the kernel thread, and likely lead to further issues (e.g.\n   lockup or panic()).\n\n2) The plain C accesses are subject to HW PAN and SW PAN, and so when\n   either is in use, any attempt to simulate an access to user memory\n   will fault. Thus neither simulate_ldr_literal() nor\n   simulate_ldrsw_literal() can do anything useful when simulating a\n   user instruction on any system with HW PAN or SW PAN.\n\n3) The plain C accesses are privileged, as they run in kernel context,\n   and in practice can access a small range of kernel virtual addresses.\n   The instructions they simulate have a range of +/-1MiB, and since the\n   simulated instructions must itself be a user instructions in the\n   TTBR0 address range, these can address the final 1MiB of the TTBR1\n   acddress range by wrapping downwards from an address in the first\n   1MiB of the TTBR0 address range.\n\n   In contemporary kernels the last 8MiB of TTBR1 address range is\n   reserved, and accesses to this will always fault, meaning this is no\n   worse than (1).\n\n   Historically, it was theoretically possible for the linear map or\n   vmemmap to spill into the final 8MiB of the TTBR1 address range, but\n   in practice this is extremely unlikely to occur as this would\n   require either:\n\n   * Having enough physical memory to fill the entire linear map all the\n     way to the final 1MiB of the TTBR1 address range.\n\n   * Getting unlucky with KASLR randomization of the linear map such\n     that the populated region happens to overlap with the last 1MiB of\n     the TTBR address range.\n\n   ... and in either case if we were to spill into the final page there\n   would be larger problems as the final page would alias with error\n   pointers.\n\nPractically speaking, (1) and (2) are the big issues. Given there have\nbeen no reports of problems since the broken code was introduced, it\nappears that no-one is relying on probing these instructions with\nuprobes.\n\nAvoid these issues by not allowing uprobes on LDR (literal) and LDRSW\n(literal), limiting the use of simulate_ldr_literal() and\nsimulate_ldrsw_literal() to kprobes. Attempts to place uprobes on LDR\n(literal) and LDRSW (literal) will be rejected as\narm_probe_decode_insn() will return INSN_REJECTED. In future we can\nconsider introducing working uprobes support for these instructions, but\nthis will require more significant work.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2446"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-50099"
		},
		{
			"cve":"CVE-2024-50115",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nKVM: nSVM: Ignore nCR3[4:0] when loading PDPTEs from memory\n\nIgnore nCR3[4:0] when loading PDPTEs from memory for nested SVM, as bits\n4:0 of CR3 are ignored when PAE paging is used, and thus VMRUN doesn't\nenforce 32-byte alignment of nCR3.\n\nIn the absolute worst case scenario, failure to ignore bits 4:0 can result\nin an out-of-bounds read, e.g. if the target page is at the end of a\nmemslot, and the VMM isn't using guard pages.\n\nPer the APM:\n\n  The CR3 register points to the base address of the page-directory-pointer\n  table. The page-directory-pointer table is aligned on a 32-byte boundary,\n  with the low 5 address bits 4:0 assumed to be 0.\n\nAnd the SDM's much more explicit:\n\n  4:0    Ignored\n\nNote, KVM gets this right when loading PDPTRs, it's only the nSVM flow\nthat is broken.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2446"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.1,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2024-50115"
		},
		{
			"cve":"CVE-2024-50124",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: ISO: Fix UAF on iso_sock_timeout\n\nconn->sk maybe have been unlinked/freed while waiting for iso_conn_lock\nso this checks if the conn->sk is still valid by checking if it part of\niso_sk_list.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2446"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.8,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2024-50124"
		},
		{
			"cve":"CVE-2024-50138",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Use raw_spinlock_t in ringbuf\n\nThe function __bpf_ringbuf_reserve is invoked from a tracepoint, which\ndisables preemption. Using spinlock_t in this context can lead to a\n\"sleep in atomic\" warning in the RT variant. This issue is illustrated\nin the example below:\n\nBUG: sleeping function called from invalid context at kernel/locking/spinlock_rt.c:48\nin_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 556208, name: test_progs\npreempt_count: 1, expected: 0\nRCU nest depth: 1, expected: 1\nINFO: lockdep is turned off.\nPreemption disabled at:\n[<ffffd33a5c88ea44>] migrate_enable+0xc0/0x39c\nCPU: 7 PID: 556208 Comm: test_progs Tainted: G\nHardware name: Qualcomm SA8775P Ride (DT)\nCall trace:\n dump_backtrace+0xac/0x130\n show_stack+0x1c/0x30\n dump_stack_lvl+0xac/0xe8\n dump_stack+0x18/0x30\n __might_resched+0x3bc/0x4fc\n rt_spin_lock+0x8c/0x1a4\n __bpf_ringbuf_reserve+0xc4/0x254\n bpf_ringbuf_reserve_dynptr+0x5c/0xdc\n bpf_prog_ac3d15160d62622a_test_read_write+0x104/0x238\n trace_call_bpf+0x238/0x774\n perf_call_bpf_enter.isra.0+0x104/0x194\n perf_syscall_enter+0x2f8/0x510\n trace_sys_enter+0x39c/0x564\n syscall_trace_enter+0x220/0x3c0\n do_el0_svc+0x138/0x1dc\n el0_svc+0x54/0x130\n el0t_64_sync_handler+0x134/0x150\n el0t_64_sync+0x17c/0x180\n\nSwitch the spinlock to raw_spinlock_t to avoid this error.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2446"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-50138"
		},
		{
			"cve":"CVE-2024-50151",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nsmb: client: fix OOBs when building SMB2_IOCTL request\n\nWhen using encryption, either enforced by the server or when using\n'seal' mount option, the client will squash all compound request buffers\ndown for encryption into a single iov in smb2_set_next_command().\n\nSMB2_ioctl_init() allocates a small buffer (448 bytes) to hold the\nSMB2_IOCTL request in the first iov, and if the user passes an input\nbuffer that is greater than 328 bytes, smb2_set_next_command() will\nend up writing off the end of @rqst->iov[0].iov_base as shown below:\n\n  mount.cifs //srv/share /mnt -o ...,seal\n  ln -s $(perl -e \"print('a')for 1..1024\") /mnt/link\n\n  BUG: KASAN: slab-out-of-bounds in\n  smb2_set_next_command.cold+0x1d6/0x24c [cifs]\n  Write of size 4116 at addr ffff8881148fcab8 by task ln/859\n\n  CPU: 1 UID: 0 PID: 859 Comm: ln Not tainted 6.12.0-rc3 #1\n  Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS\n  1.16.3-2.fc40 04/01/2014\n  Call Trace:\n   <TASK>\n   dump_stack_lvl+0x5d/0x80\n   ? smb2_set_next_command.cold+0x1d6/0x24c [cifs]\n   print_report+0x156/0x4d9\n   ? smb2_set_next_command.cold+0x1d6/0x24c [cifs]\n   ? __virt_addr_valid+0x145/0x310\n   ? __phys_addr+0x46/0x90\n   ? smb2_set_next_command.cold+0x1d6/0x24c [cifs]\n   kasan_report+0xda/0x110\n   ? smb2_set_next_command.cold+0x1d6/0x24c [cifs]\n   kasan_check_range+0x10f/0x1f0\n   __asan_memcpy+0x3c/0x60\n   smb2_set_next_command.cold+0x1d6/0x24c [cifs]\n   smb2_compound_op+0x238c/0x3840 [cifs]\n   ? kasan_save_track+0x14/0x30\n   ? kasan_save_free_info+0x3b/0x70\n   ? vfs_symlink+0x1a1/0x2c0\n   ? do_symlinkat+0x108/0x1c0\n   ? __pfx_smb2_compound_op+0x10/0x10 [cifs]\n   ? kmem_cache_free+0x118/0x3e0\n   ? cifs_get_writable_path+0xeb/0x1a0 [cifs]\n   smb2_get_reparse_inode+0x423/0x540 [cifs]\n   ? __pfx_smb2_get_reparse_inode+0x10/0x10 [cifs]\n   ? rcu_is_watching+0x20/0x50\n   ? __kmalloc_noprof+0x37c/0x480\n   ? smb2_create_reparse_symlink+0x257/0x490 [cifs]\n   ? smb2_create_reparse_symlink+0x38f/0x490 [cifs]\n   smb2_create_reparse_symlink+0x38f/0x490 [cifs]\n   ? __pfx_smb2_create_reparse_symlink+0x10/0x10 [cifs]\n   ? find_held_lock+0x8a/0xa0\n   ? hlock_class+0x32/0xb0\n   ? __build_path_from_dentry_optional_prefix+0x19d/0x2e0 [cifs]\n   cifs_symlink+0x24f/0x960 [cifs]\n   ? __pfx_make_vfsuid+0x10/0x10\n   ? __pfx_cifs_symlink+0x10/0x10 [cifs]\n   ? make_vfsgid+0x6b/0xc0\n   ? generic_permission+0x96/0x2d0\n   vfs_symlink+0x1a1/0x2c0\n   do_symlinkat+0x108/0x1c0\n   ? __pfx_do_symlinkat+0x10/0x10\n   ? strncpy_from_user+0xaa/0x160\n   __x64_sys_symlinkat+0xb9/0xf0\n   do_syscall_64+0xbb/0x1d0\n   entry_SYSCALL_64_after_hwframe+0x77/0x7f\n  RIP: 0033:0x7f08d75c13bb",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2446"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-50151"
		},
		{
			"cve":"CVE-2024-50153",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: target: core: Fix null-ptr-deref in target_alloc_device()\n\nThere is a null-ptr-deref issue reported by KASAN:\n\nBUG: KASAN: null-ptr-deref in target_alloc_device+0xbc4/0xbe0 [target_core_mod]\n...\n kasan_report+0xb9/0xf0\n target_alloc_device+0xbc4/0xbe0 [target_core_mod]\n core_dev_setup_virtual_lun0+0xef/0x1f0 [target_core_mod]\n target_core_init_configfs+0x205/0x420 [target_core_mod]\n do_one_initcall+0xdd/0x4e0\n...\n entry_SYSCALL_64_after_hwframe+0x76/0x7e\n\nIn target_alloc_device(), if allocing memory for dev queues fails, then\ndev will be freed by dev->transport->free_device(), but dev->transport\nis not initialized at that time, which will lead to a null pointer\nreference problem.\n\nFixing this bug by freeing dev with hba->backend->ops->free_device().",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2446"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-50153"
		},
		{
			"cve":"CVE-2024-50180",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nfbdev: sisfb: Fix strbuf array overflow\n\nThe values of the variables xres and yres are placed in strbuf.\nThese variables are obtained from strbuf1.\nThe strbuf1 array contains digit characters\nand a space if the array contains non-digit characters.\nThen, when executing sprintf(strbuf, \"%ux%ux8\", xres, yres);\nmore than 16 bytes will be written to strbuf.\nIt is suggested to increase the size of the strbuf array to 24.\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2446"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"LOW",
						"baseScore":3.9,
						"vectorString":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Low",
					"category":"impact"
				}
			],
			"title":"CVE-2024-50180"
		},
		{
			"cve":"CVE-2024-50193",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nx86/entry_32: Clear CPU buffers after register restore in NMI return\n\nCPU buffers are currently cleared after call to exc_nmi, but before\nregister state is restored. This may be okay for MDS mitigation but not for\nRDFS. Because RDFS mitigation requires CPU buffers to be cleared when\nregisters don't have any sensitive data.\n\nMove CLEAR_CPU_BUFFERS after RESTORE_ALL_NMI.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2446"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"LOW",
						"baseScore":3.9,
						"vectorString":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Low",
					"category":"impact"
				}
			],
			"title":"CVE-2024-50193"
		},
		{
			"cve":"CVE-2024-50198",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\niio: light: veml6030: fix IIO device retrieval from embedded device\n\nThe dev pointer that is received as an argument in the\nin_illuminance_period_available_show function references the device\nembedded in the IIO device, not in the i2c client.\n\ndev_to_iio_dev() must be used to accessthe right data. The current\nimplementation leads to a segmentation fault on every attempt to read\nthe attribute because indio_dev gets a NULL assignment.\n\nThis bug has been present since the first appearance of the driver,\napparently since the last version (V6) before getting applied. A\nconstant attribute was used until then, and the last modifications might\nhave not been tested again.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2446"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-50198"
		},
		{
			"cve":"CVE-2024-50202",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nnilfs2: propagate directory read errors from nilfs_find_entry()\n\nSyzbot reported that a task hang occurs in vcs_open() during a fuzzing\ntest for nilfs2.\n\nThe root cause of this problem is that in nilfs_find_entry(), which\nsearches for directory entries, ignores errors when loading a directory\npage/folio via nilfs_get_folio() fails.\n\nIf the filesystem images is corrupted, and the i_size of the directory\ninode is large, and the directory page/folio is successfully read but\nfails the sanity check, for example when it is zero-filled,\nnilfs_check_folio() may continue to spit out error messages in bursts.\n\nFix this issue by propagating the error to the callers when loading a\npage/folio fails in nilfs_find_entry().\n\nThe current interface of nilfs_find_entry() and its callers is outdated\nand cannot propagate error codes such as -EIO and -ENOMEM returned via\nnilfs_find_entry(), so fix it together.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2446"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-50202"
		},
		{
			"cve":"CVE-2024-50215",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nnvmet-auth: assign dh_key to NULL after kfree_sensitive\n\nctrl->dh_key might be used across multiple calls to nvmet_setup_dhgroup()\nfor the same controller. So it's better to nullify it after release on\nerror path in order to avoid double free later in nvmet_destroy_auth().\n\nFound by Linux Verification Center (linuxtesting.org) with Svace.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2446"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.8,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2024-50215"
		},
		{
			"cve":"CVE-2024-50237",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: mac80211: do not pass a stopped vif to the driver in .get_txpower\n\nAvoid potentially crashing in the driver because of uninitialized private data",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2446"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-50237"
		},
		{
			"cve":"CVE-2024-50242",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nfs/ntfs3: Additional check in ntfs_file_release",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2446"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.8,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2024-50242"
		},
		{
			"cve":"CVE-2024-50243",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nfs/ntfs3: Fix general protection fault in run_is_mapped_full\n\nFixed deleating of a non-resident attribute in ntfs_create_inode()\nrollback.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2446"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-50243"
		},
		{
			"cve":"CVE-2024-50244",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nfs/ntfs3: Additional check in ni_clear()\n\nChecking of NTFS_FLAGS_LOG_REPLAYING added to prevent access to\nuninitialized bitmap during replay process.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2446"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-50244"
		},
		{
			"cve":"CVE-2024-50245",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nfs/ntfs3: Fix possible deadlock in mi_read\n\nMutex lock with another subclass used in ni_lock_dir().",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2446"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-50245"
		},
		{
			"cve":"CVE-2024-50246",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nfs/ntfs3: Add rough attr alloc_size check",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2446"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.8,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2024-50246"
		},
		{
			"cve":"CVE-2024-50247",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nfs/ntfs3: Check if more than chunk-size bytes are written\n\nA incorrectly formatted chunk may decompress into\nmore than LZNT_CHUNK_SIZE bytes and a index out of bounds\nwill occur in s_max_off.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2446"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.1,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2024-50247"
		},
		{
			"cve":"CVE-2024-50250",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nfsdax: dax_unshare_iter needs to copy entire blocks\n\nThe code that copies data from srcmap to iomap in dax_unshare_iter is\nvery very broken, which bfoster's recent fsx changes have exposed.\n\nIf the pos and len passed to dax_file_unshare are not aligned to an\nfsblock boundary, the iter pos and length in the _iter function will\nreflect this unalignment.\n\ndax_iomap_direct_access always returns a pointer to the start of the\nkmapped fsdax page, even if its pos argument is in the middle of that\npage.  This is catastrophic for data integrity when iter->pos is not\naligned to a page, because daddr/saddr do not point to the same byte in\nthe file as iter->pos.  Hence we corrupt user data by copying it to the\nwrong place.\n\nIf iter->pos + iomap_length() in the _iter function not aligned to a\npage, then we fail to copy a full block, and only partially populate the\ndestination block.  This is catastrophic for data confidentiality\nbecause we expose stale pmem contents.\n\nFix both of these issues by aligning copy_pos/copy_len to a page\nboundary (remember, this is fsdax so 1 fsblock == 1 base page) so that\nwe always copy full blocks.\n\nWe're not done yet -- there's no call to invalidate_inode_pages2_range,\nso programs that have the file range mmap'd will continue accessing the\nold memory mapping after the file metadata updates have completed.\n\nBe careful with the return value -- if the unshare succeeds, we still\nneed to return the number of bytes that the iomap iter thinks we're\noperating on.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2446"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.1,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-55.0.0.58.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-55.0.0.58.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2024-50250"
		}
	]
}