{
	"document":{
		"aggregate_severity":{
			"namespace":"https://nvd.nist.gov/vuln-metrics/cvss",
			"text":"High"
		},
		"category":"csaf_vex",
		"csaf_version":"2.0",
		"distribution":{
			"tlp":{
				"label":"WHITE",
				"url":"https:/www.first.org/tlp/"
			}
		},
		"lang":"en",
		"notes":[
			{
				"text":"kernel security update",
				"category":"general",
				"title":"Synopsis"
			},
			{
				"text":"An update for kernel is now available for openEuler-22.03-LTS-SP1",
				"category":"general",
				"title":"Summary"
			},
			{
				"text":"The Linux Kernel, the operating system core itself.\n\nSecurity Fix(es):\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nserial: sc16is7xx: fix invalid FIFO access with special register set\n\nWhen enabling access to the special register set, Receiver time-out and\nRHR interrupts can happen. In this case, the IRQ handler will try to read\nfrom the FIFO thru the RHR register at address 0x00, but address 0x00 is\nmapped to DLL register, resulting in erroneous FIFO reading.\n\nCall graph example:\n    sc16is7xx_startup(): entry\n    sc16is7xx_ms_proc(): entry\n    sc16is7xx_set_termios(): entry\n    sc16is7xx_set_baud(): DLH/DLL = $009C --> access special register set\n    sc16is7xx_port_irq() entry            --> IIR is 0x0C\n    sc16is7xx_handle_rx() entry\n    sc16is7xx_fifo_read(): --> unable to access FIFO (RHR) because it is\n                               mapped to DLL (LCR=LCR_CONF_MODE_A)\n    sc16is7xx_set_baud(): exit --> Restore access to general register set\n\nFix the problem by claiming the efr_lock mutex when accessing the Special\nregister set.(CVE-2024-44950)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Check link_index before accessing dc->links[]\n\n[WHY & HOW]\ndc->links[] has max size of MAX_LINKS and NULL is return when trying to\naccess with out-of-bound index.\n\nThis fixes 3 OVERRUN and 1 RESOURCE_LEAK issues reported by Coverity.(CVE-2024-46813)\n\nIn the Linux kernel, the following vulnerability has been resolved:  ipv6: avoid possible NULL deref in rt6_uncached_list_flush_dev()  Blamed commit accidentally removed a check for rt->rt6i_idev being NULL, as spotted by syzbot:  Oops: general protection fault, probably for non-canonical address 0xdffffc0000000000: 0000 [#1] PREEMPT SMP KASAN PTI KASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007] CPU: 1 UID: 0 PID: 10998 Comm: syz-executor Not tainted 6.11.0-rc6-syzkaller-00208-g625403177711 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024  RIP: 0010:rt6_uncached_list_flush_dev net/ipv6/route.c:177 [inline]  RIP: 0010:rt6_disable_ip+0x33e/0x7e0 net/ipv6/route.c:4914 Code: 41 80 3c 04 00 74 0a e8 90 d0 9b f7 48 8b 7c 24 08 48 8b 07 48 89 44 24 10 4c 89 f0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <80> 3c 08 00 74 08 4c 89 f7 e8 64 d0 9b f7 48 8b 44 24 18 49 39 06 RSP: 0018:ffffc900047374e0 EFLAGS: 00010246 RAX: 0000000000000000 RBX: 1ffff1100fdf8f33 RCX: dffffc0000000000 RDX: 0000000000000000 RSI: 0000000000000004 RDI: ffff88807efc78c0 RBP: ffffc900047375d0 R08: 0000000000000003 R09: fffff520008e6e8c R10: dffffc0000000000 R11: fffff520008e6e8c R12: 1ffff1100fdf8f18 R13: ffff88807efc7998 R14: 0000000000000000 R15: ffff88807efc7930 FS:  0000000000000000(0000) GS:ffff8880b8900000(0000) knlGS:0000000000000000 CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000020002a80 CR3: 0000000022f62000 CR4: 00000000003506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace:  <TASK>   addrconf_ifdown+0x15d/0x1bd0 net/ipv6/addrconf.c:3856  addrconf_notify+0x3cb/0x1020   notifier_call_chain+0x19f/0x3e0 kernel/notifier.c:93   call_netdevice_notifiers_extack net/core/dev.c:2032 [inline]   call_netdevice_notifiers net/core/dev.c:2046 [inline]   unregister_netdevice_many_notify+0xd81/0x1c40 net/core/dev.c:11352   unregister_netdevice_many net/core/dev.c:11414 [inline]   unregister_netdevice_queue+0x303/0x370 net/core/dev.c:11289   unregister_netdevice include/linux/netdevice.h:3129 [inline]   __tun_detach+0x6b9/0x1600 drivers/net/tun.c:685   tun_detach drivers/net/tun.c:701 [inline]   tun_chr_close+0x108/0x1b0 drivers/net/tun.c:3510   __fput+0x24a/0x8a0 fs/file_table.c:422   task_work_run+0x24f/0x310 kernel/task_work.c:228   exit_task_work include/linux/task_work.h:40 [inline]   do_exit+0xa2f/0x27f0 kernel/exit.c:882   do_group_exit+0x207/0x2c0 kernel/exit.c:1031   __do_sys_exit_group kernel/exit.c:1042 [inline]   __se_sys_exit_group kernel/exit.c:1040 [inline]   __x64_sys_exit_group+0x3f/0x40 kernel/exit.c:1040   x64_sys_call+0x2634/0x2640 arch/x86/include/generated/asm/syscalls_64.h:232   do_syscall_x64 arch/x86/entry/common.c:52 [inline]   do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83  entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f1acc77def9 Code: Unable to access opcode bytes at 0x7f1acc77decf. RSP: 002b:00007ffeb26fa738 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f1acc77def9 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000043 RBP: 00007f1acc7dd508 R08: 00007ffeb26f84d7 R09: 0000000000000003 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 R13: 0000000000000003 R14: 00000000ffffffff R15: 00007ffeb26fa8e0  </TASK> Modules linked in: ---[ end trace 0000000000000000 ]---  RIP: 0010:rt6_uncached_list_flush_dev net/ipv6/route.c:177 [inline]  RIP: 0010:rt6_disable_ip+0x33e/0x7e0 net/ipv6/route.c:4914 Code: 41 80 3c 04 00 74 0a e8 90 d0 9b f7 48 8b 7c 24 08 48 8b 07 48 89 44 24 10 4c 89 f0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <80> 3c 08 00 74 08 4c 89 f7 e8 64 d0 9b f7 48 8b 44 24 18 49 39 06 RSP: 0018:ffffc900047374e0 EFLAGS: 00010246 RAX: 0000000000000000 RBX: 1ffff1100fdf8f33 RCX: dffffc0000000000 RDX: 0000000000000000 RSI: 0000000000000004 RDI: ffff88807efc78c0 R ---truncated---(CVE-2024-47707)\n\nIn the Linux kernel, the following vulnerability has been resolved:  wifi: rtw88: always wait for both firmware loading attempts  In 'rtw_wait_firmware_completion()', always wait for both (regular and wowlan) firmware loading attempts. Otherwise if 'rtw_usb_intf_init()' has failed in 'rtw_usb_probe()', 'rtw_usb_disconnect()' may issue 'ieee80211_free_hw()' when one of 'rtw_load_firmware_cb()' (usually the wowlan one) is still in progress, causing UAF detected by KASAN.(CVE-2024-47718)\n\nIn the Linux kernel, the following vulnerability has been resolved:  scsi: lpfc: Validate hdwq pointers before dereferencing in reset/errata paths  When the HBA is undergoing a reset or is handling an errata event, NULL ptr dereference crashes may occur in routines such as lpfc_sli_flush_io_rings(), lpfc_dev_loss_tmo_callbk(), or lpfc_abort_handler().  Add NULL ptr checks before dereferencing hdwq pointers that may have been freed due to operations colliding with a reset or errata event handler.(CVE-2024-49891)\n\nIn the Linux kernel, the following vulnerability has been resolved:  wifi: ath11k: fix array out-of-bound access in SoC stats  Currently, the ath11k_soc_dp_stats::hal_reo_error array is defined with a maximum size of DP_REO_DST_RING_MAX. However, the ath11k_dp_process_rx() function access ath11k_soc_dp_stats::hal_reo_error using the REO destination SRNG ring ID, which is incorrect. SRNG ring ID differ from normal ring ID, and this usage leads to out-of-bounds array access. To fix this issue, modify ath11k_dp_process_rx() to use the normal ring ID directly instead of the SRNG ring ID to avoid out-of-bounds array access.  Tested-on: QCN9074 hw1.0 PCI WLAN.HK.2.7.0.1-01744-QCAHKSWPL_SILICONZ-1(CVE-2024-49930)\n\nIn the Linux kernel, the following vulnerability has been resolved:  wifi: ath9k_htc: Use __skb_set_length() for resetting urb before resubmit  Syzbot points out that skb_trim() has a sanity check on the existing length of the skb, which can be uninitialised in some error paths. The intent here is clearly just to reset the length to zero before resubmitting, so switch to calling __skb_set_length(skb, 0) directly. In addition, __skb_set_length() already contains a call to skb_reset_tail_pointer(), so remove the redundant call.  The syzbot report came from ath9k_hif_usb_reg_in_cb(), but there's a similar usage of skb_trim() in ath9k_hif_usb_rx_cb(), change both while we're at it.(CVE-2024-49938)\n\nIn the Linux kernel, the following vulnerability has been resolved:  sctp: set sk_state back to CLOSED if autobind fails in sctp_listen_start  In sctp_listen_start() invoked by sctp_inet_listen(), it should set the sk_state back to CLOSED if sctp_autobind() fails due to whatever reason.  Otherwise, next time when calling sctp_inet_listen(), if sctp_sk(sk)->reuse is already set via setsockopt(SCTP_REUSE_PORT), sctp_sk(sk)->bind_hash will be dereferenced as sk_state is LISTENING, which causes a crash as bind_hash is NULL.    KASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007]   RIP: 0010:sctp_inet_listen+0x7f0/0xa20 net/sctp/socket.c:8617   Call Trace:    <TASK>    __sys_listen_socket net/socket.c:1883 [inline]    __sys_listen+0x1b7/0x230 net/socket.c:1894    __do_sys_listen net/socket.c:1902 [inline](CVE-2024-49944)\n\nIn the Linux kernel, the following vulnerability has been resolved:  net: ethernet: lantiq_etop: fix memory disclosure  When applying padding, the buffer is not zeroed, which results in memory disclosure. The mentioned data is observed on the wire. This patch uses skb_put_padto() to pad Ethernet frames properly. The mentioned function zeroes the expanded buffer.  In case the packet cannot be padded it is silently dropped. Statistics are also not incremented. This driver does not support statistics in the old 32-bit format or the new 64-bit format. These will be added in the future. In its current form, the patch should be easily backported to stable versions.  Ethernet MACs on Amazon-SE and Danube cannot do padding of the packets in hardware, so software padding must be applied.(CVE-2024-49997)\n\nIn the Linux kernel, the following vulnerability has been resolved:  net: Fix an unsafe loop on the list  The kernel may crash when deleting a genetlink family if there are still listeners for that family:  Oops: Kernel access of bad area, sig: 11 [#1]   ...   NIP [c000000000c080bc] netlink_update_socket_mc+0x3c/0xc0   LR [c000000000c0f764] __netlink_clear_multicast_users+0x74/0xc0   Call Trace: __netlink_clear_multicast_users+0x74/0xc0 genl_unregister_family+0xd4/0x2d0  Change the unsafe loop on the list to a safe one, because inside the loop there is an element removal from this list.(CVE-2024-50024)\n\nIn the Linux kernel, the following vulnerability has been resolved:  net/sched: accept TCA_STAB only for root qdisc  Most qdiscs maintain their backlog using qdisc_pkt_len(skb) on the assumption it is invariant between the enqueue() and dequeue() handlers.  Unfortunately syzbot can crash a host rather easily using a TBF + SFQ combination, with an STAB on SFQ [1]  We can't support TCA_STAB on arbitrary level, this would require to maintain per-qdisc storage.  [1] [   88.796496] BUG: kernel NULL pointer dereference, address: 0000000000000000 [   88.798611] #PF: supervisor read access in kernel mode [   88.799014] #PF: error_code(0x0000) - not-present page [   88.799506] PGD 0 P4D 0 [   88.799829] Oops: Oops: 0000 [#1] SMP NOPTI [   88.800569] CPU: 14 UID: 0 PID: 2053 Comm: b371744477 Not tainted 6.12.0-rc1-virtme #1117 [   88.801107] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [   88.801779] RIP: 0010:sfq_dequeue (net/sched/sch_sfq.c:272 net/sched/sch_sfq.c:499) sch_sfq [ 88.802544] Code: 0f b7 50 12 48 8d 04 d5 00 00 00 00 48 89 d6 48 29 d0 48 8b 91 c0 01 00 00 48 c1 e0 03 48 01 c2 66 83 7a 1a 00 7e c0 48 8b 3a <4c> 8b 07 4c 89 02 49 89 50 08 48 c7 47 08 00 00 00 00 48 c7 07 00 All code ========    0: 0f b7 50 12           movzwl 0x12(%rax),%edx    4: 48 8d 04 d5 00 00 00  lea    0x0(,%rdx,8),%rax    b: 00    c: 48 89 d6              mov    %rdx,%rsi    f: 48 29 d0              sub    %rdx,%rax   12: 48 8b 91 c0 01 00 00  mov    0x1c0(%rcx),%rdx   19: 48 c1 e0 03           shl    $0x3,%rax   1d: 48 01 c2              add    %rax,%rdx   20: 66 83 7a 1a 00        cmpw   $0x0,0x1a(%rdx)   25: 7e c0                 jle    0xffffffffffffffe7   27: 48 8b 3a              mov    (%rdx),%rdi   2a:* 4c 8b 07              mov    (%rdi),%r8  <-- trapping instruction   2d: 4c 89 02              mov    %r8,(%rdx)   30: 49 89 50 08           mov    %rdx,0x8(%r8)   34: 48 c7 47 08 00 00 00  movq   $0x0,0x8(%rdi)   3b: 00   3c: 48                    rex.W   3d: c7                    .byte 0xc7   3e: 07                    (bad)  ...  Code starting with the faulting instruction ===========================================    0: 4c 8b 07              mov    (%rdi),%r8    3: 4c 89 02              mov    %r8,(%rdx)    6: 49 89 50 08           mov    %rdx,0x8(%r8)    a: 48 c7 47 08 00 00 00  movq   $0x0,0x8(%rdi)   11: 00   12: 48                    rex.W   13: c7                    .byte 0xc7   14: 07                    (bad)  ... [   88.803721] RSP: 0018:ffff9a1f892b7d58 EFLAGS: 00000206 [   88.804032] RAX: 0000000000000000 RBX: ffff9a1f8420c800 RCX: ffff9a1f8420c800 [   88.804560] RDX: ffff9a1f81bc1440 RSI: 0000000000000000 RDI: 0000000000000000 [   88.805056] RBP: ffffffffc04bb0e0 R08: 0000000000000001 R09: 00000000ff7f9a1f [   88.805473] R10: 000000000001001b R11: 0000000000009a1f R12: 0000000000000140 [   88.806194] R13: 0000000000000001 R14: ffff9a1f886df400 R15: ffff9a1f886df4ac [   88.806734] FS:  00007f445601a740(0000) GS:ffff9a2e7fd80000(0000) knlGS:0000000000000000 [   88.807225] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [   88.807672] CR2: 0000000000000000 CR3: 000000050cc46000 CR4: 00000000000006f0 [   88.808165] Call Trace: [   88.808459]  <TASK> [   88.808710] ? __die (arch/x86/kernel/dumpstack.c:421 arch/x86/kernel/dumpstack.c:434) [   88.809261] ? page_fault_oops (arch/x86/mm/fault.c:715) [   88.809561] ? exc_page_fault (./arch/x86/include/asm/irqflags.h:26 ./arch/x86/include/asm/irqflags.h:87 ./arch/x86/include/asm/irqflags.h:147 arch/x86/mm/fault.c:1489 arch/x86/mm/fault.c:1539) [   88.809806] ? asm_exc_page_fault (./arch/x86/include/asm/idtentry.h:623) [   88.810074] ? sfq_dequeue (net/sched/sch_sfq.c:272 net/sched/sch_sfq.c:499) sch_sfq [   88.810411] sfq_reset (net/sched/sch_sfq.c:525) sch_sfq [   88.810671] qdisc_reset (./include/linux/skbuff.h:2135 ./include/linux/skbuff.h:2441 ./include/linux/skbuff.h:3304 ./include/linux/skbuff.h:3310 net/sched/sch_g ---truncated---(CVE-2024-50039)\n\nIn the Linux kernel, the following vulnerability has been resolved:  Bluetooth: RFCOMM: FIX possible deadlock in rfcomm_sk_state_change  rfcomm_sk_state_change attempts to use sock_lock so it must never be called with it locked but rfcomm_sock_ioctl always attempt to lock it causing the following trace:  ====================================================== WARNING: possible circular locking dependency detected 6.8.0-syzkaller-08951-gfe46a7dd189e #0 Not tainted ------------------------------------------------------ syz-executor386/5093 is trying to acquire lock: ffff88807c396258 (sk_lock-AF_BLUETOOTH-BTPROTO_RFCOMM){+.+.}-{0:0}, at: lock_sock include/net/sock.h:1671 [inline] ffff88807c396258 (sk_lock-AF_BLUETOOTH-BTPROTO_RFCOMM){+.+.}-{0:0}, at: rfcomm_sk_state_change+0x5b/0x310 net/bluetooth/rfcomm/sock.c:73  but task is already holding lock: ffff88807badfd28 (&d->lock){+.+.}-{3:3}, at: __rfcomm_dlc_close+0x226/0x6a0 net/bluetooth/rfcomm/core.c:491(CVE-2024-50044)\n\nIn the Linux kernel, the following vulnerability has been resolved:  nvme-pci: fix race condition between reset and nvme_dev_disable()  nvme_dev_disable() modifies the dev->online_queues field, therefore nvme_pci_update_nr_queues() should avoid racing against it, otherwise we could end up passing invalid values to blk_mq_update_nr_hw_queues().   WARNING: CPU: 39 PID: 61303 at drivers/pci/msi/api.c:347           pci_irq_get_affinity+0x187/0x210  Workqueue: nvme-reset-wq nvme_reset_work [nvme]  RIP: 0010:pci_irq_get_affinity+0x187/0x210  Call Trace:   <TASK>   ? blk_mq_pci_map_queues+0x87/0x3c0   ? pci_irq_get_affinity+0x187/0x210   blk_mq_pci_map_queues+0x87/0x3c0   nvme_pci_map_queues+0x189/0x460 [nvme]   blk_mq_update_nr_hw_queues+0x2a/0x40   nvme_reset_work+0x1be/0x2a0 [nvme]  Fix the bug by locking the shutdown_lock mutex before using dev->online_queues. Give up if nvme_dev_disable() is running or if it has been executed already.(CVE-2024-50135)\n\nIn the Linux kernel, the following vulnerability has been resolved:  Bluetooth: bnep: fix wild-memory-access in proto_unregister  There's issue as follows:   KASAN: maybe wild-memory-access in range [0xdead...108-0xdead...10f]   CPU: 3 UID: 0 PID: 2805 Comm: rmmod Tainted: G        W   RIP: 0010:proto_unregister+0xee/0x400   Call Trace:    <TASK>    __do_sys_delete_module+0x318/0x580    do_syscall_64+0xc1/0x1d0    entry_SYSCALL_64_after_hwframe+0x77/0x7f  As bnep_init() ignore bnep_sock_init()'s return value, and bnep_sock_init() will cleanup all resource. Then when remove bnep module will call bnep_sock_cleanup() to cleanup sock's resource. To solve above issue just return bnep_sock_init()'s return value in bnep_exit().(CVE-2024-50148)\n\nIn the Linux kernel, the following vulnerability has been resolved:  net: systemport: fix potential memory leak in bcm_sysport_xmit()  The bcm_sysport_xmit() returns NETDEV_TX_OK without freeing skb in case of dma_map_single() fails, add dev_kfree_skb() to fix it.(CVE-2024-50171)\n\nIn the Linux kernel, the following vulnerability has been resolved:  pinctrl: ocelot: fix system hang on level based interrupts  The current implementation only calls chained_irq_enter() and chained_irq_exit() if it detects pending interrupts.  ``` for (i = 0; i < info->stride; i++) {  uregmap_read(info->map, id_reg + 4 * i, &reg);  if (!reg)   continue;   chained_irq_enter(parent_chip, desc); ```  However, in case of GPIO pin configured in level mode and the parent controller configured in edge mode, GPIO interrupt might be lowered by the hardware. In the result, if the interrupt is short enough, the parent interrupt is still pending while the GPIO interrupt is cleared; chained_irq_enter() never gets called and the system hangs trying to service the parent interrupt.  Moving chained_irq_enter() and chained_irq_exit() outside the for loop ensures that they are called even when GPIO interrupt is lowered by the hardware.  The similar code with chained_irq_enter() / chained_irq_exit() functions wrapping interrupt checking loop may be found in many other drivers: ``` grep -r -A 10 chained_irq_enter drivers/pinctrl ```(CVE-2024-50196)\n\nIn the Linux kernel, the following vulnerability has been resolved:  RDMA/bnxt_re: Fix a bug while setting up Level-2 PBL pages  Avoid memory corruption while setting up Level-2 PBL pages for the non MR resources when num_pages > 256K.  There will be a single PDE page address (contiguous pages in the case of > PAGE_SIZE), but, current logic assumes multiple pages, leading to invalid memory access after 256K PBL entries in the PDE.(CVE-2024-50208)\n\nIn the Linux kernel, the following vulnerability has been resolved:  RDMA/bnxt_re: Add a check for memory allocation  __alloc_pbl() can return error when memory allocation fails. Driver is not checking the status on one of the instances.(CVE-2024-50209)\n\nIn the Linux kernel, the following vulnerability has been resolved:  wifi: iwlegacy: Clear stale interrupts before resuming device  iwl4965 fails upon resume from hibernation on my laptop. The reason seems to be a stale interrupt which isn't being cleared out before interrupts are enabled. We end up with a race beween the resume trying to bring things back up, and the restart work (queued form the interrupt handler) trying to bring things down. Eventually the whole thing blows up.  Fix the problem by clearing out any stale interrupts before interrupts get enabled during resume.  Here's a debug log of the indicent: [   12.042589] ieee80211 phy0: il_isr ISR inta 0x00000080, enabled 0xaa00008b, fh 0x00000000 [   12.042625] ieee80211 phy0: il4965_irq_tasklet inta 0x00000080, enabled 0x00000000, fh 0x00000000 [   12.042651] iwl4965 0000:10:00.0: RF_KILL bit toggled to enable radio. [   12.042653] iwl4965 0000:10:00.0: On demand firmware reload [   12.042690] ieee80211 phy0: il4965_irq_tasklet End inta 0x00000000, enabled 0xaa00008b, fh 0x00000000, flags 0x00000282 [   12.052207] ieee80211 phy0: il4965_mac_start enter [   12.052212] ieee80211 phy0: il_prep_station Add STA to driver ID 31: ff:ff:ff:ff:ff:ff [   12.052244] ieee80211 phy0: il4965_set_hw_ready hardware  ready [   12.052324] ieee80211 phy0: il_apm_init Init card's basic functions [   12.052348] ieee80211 phy0: il_apm_init L1 Enabled; Disabling L0S [   12.055727] ieee80211 phy0: il4965_load_bsm Begin load bsm [   12.056140] ieee80211 phy0: il4965_verify_bsm Begin verify bsm [   12.058642] ieee80211 phy0: il4965_verify_bsm BSM bootstrap uCode image OK [   12.058721] ieee80211 phy0: il4965_load_bsm BSM write complete, poll 1 iterations [   12.058734] ieee80211 phy0: __il4965_up iwl4965 is coming up [   12.058737] ieee80211 phy0: il4965_mac_start Start UP work done. [   12.058757] ieee80211 phy0: __il4965_down iwl4965 is going down [   12.058761] ieee80211 phy0: il_scan_cancel_timeout Scan cancel timeout [   12.058762] ieee80211 phy0: il_do_scan_abort Not performing scan to abort [   12.058765] ieee80211 phy0: il_clear_ucode_stations Clearing ucode stations in driver [   12.058767] ieee80211 phy0: il_clear_ucode_stations No active stations found to be cleared [   12.058819] ieee80211 phy0: _il_apm_stop Stop card, put in low power state [   12.058827] ieee80211 phy0: _il_apm_stop_master stop master [   12.058864] ieee80211 phy0: il4965_clear_free_frames 0 frames on pre-allocated heap on clear. [   12.058869] ieee80211 phy0: Hardware restart was requested [   16.132299] iwl4965 0000:10:00.0: START_ALIVE timeout after 4000ms. [   16.132303] ------------[ cut here ]------------ [   16.132304] Hardware became unavailable upon resume. This could be a software issue prior to suspend or a hardware issue. [   16.132338] WARNING: CPU: 0 PID: 181 at net/mac80211/util.c:1826 ieee80211_reconfig+0x8f/0x14b0 [mac80211] [   16.132390] Modules linked in: ctr ccm sch_fq_codel xt_tcpudp xt_multiport xt_state iptable_filter iptable_nat nf_nat nf_conntrack nf_defrag_ipv4 ip_tables x_tables binfmt_misc joydev mousedev btusb btrtl btintel btbcm bluetooth ecdh_generic ecc iTCO_wdt i2c_dev iwl4965 iwlegacy coretemp snd_hda_codec_analog pcspkr psmouse mac80211 snd_hda_codec_generic libarc4 sdhci_pci cqhci sha256_generic sdhci libsha256 firewire_ohci snd_hda_intel snd_intel_dspcfg mmc_core snd_hda_codec snd_hwdep firewire_core led_class iosf_mbi snd_hda_core uhci_hcd lpc_ich crc_itu_t cfg80211 ehci_pci ehci_hcd snd_pcm usbcore mfd_core rfkill snd_timer snd usb_common soundcore video parport_pc parport intel_agp wmi intel_gtt backlight e1000e agpgart evdev [   16.132456] CPU: 0 UID: 0 PID: 181 Comm: kworker/u8:6 Not tainted 6.11.0-cl+ #143 [   16.132460] Hardware name: Hewlett-Packard HP Compaq 6910p/30BE, BIOS 68MCU Ver. F.19 07/06/2010 [   16.132463] Workqueue: async async_run_entry_fn [   16.132469] RIP: 0010:ieee80211_reconfig+0x8f/0x14b0 [mac80211] [   16.132501] Code: da 02 00 0 ---truncated---(CVE-2024-50234)\n\nIn the Linux kernel, the following vulnerability has been resolved:  wifi: ath10k: Fix memory leak in management tx  In the current logic, memory is allocated for storing the MSDU context during management packet TX but this memory is not being freed during management TX completion. Similar leaks are seen in the management TX cleanup logic.  Kmemleak reports this problem as below,  unreferenced object 0xffffff80b64ed250 (size 16):   comm \"kworker/u16:7\", pid 148, jiffies 4294687130 (age 714.199s)   hex dump (first 16 bytes):     00 2b d8 d8 80 ff ff ff c4 74 e9 fd 07 00 00 00  .+.......t......   backtrace:     [<ffffffe6e7b245dc>] __kmem_cache_alloc_node+0x1e4/0x2d8     [<ffffffe6e7adde88>] kmalloc_trace+0x48/0x110     [<ffffffe6bbd765fc>] ath10k_wmi_tlv_op_gen_mgmt_tx_send+0xd4/0x1d8 [ath10k_core]     [<ffffffe6bbd3eed4>] ath10k_mgmt_over_wmi_tx_work+0x134/0x298 [ath10k_core]     [<ffffffe6e78d5974>] process_scheduled_works+0x1ac/0x400     [<ffffffe6e78d60b8>] worker_thread+0x208/0x328     [<ffffffe6e78dc890>] kthread+0x100/0x1c0     [<ffffffe6e78166c0>] ret_from_fork+0x10/0x20  Free the memory during completion and cleanup to fix the leak.  Protect the mgmt_pending_tx idr_remove() operation in ath10k_wmi_tlv_op_cleanup_mgmt_tx_send() using ar->data_lock similar to other instances.  Tested-on: WCN3990 hw1.0 SNOC WLAN.HL.2.0-01387-QCAHLSWMTPLZ-1(CVE-2024-50236)\n\nIn the Linux kernel, the following vulnerability has been resolved:  sctp: properly validate chunk size in sctp_sf_ootb()  A size validation fix similar to that in Commit 50619dbf8db7 (\"sctp: add size validation when walking chunks\") is also required in sctp_sf_ootb() to address a crash reported by syzbot:    BUG: KMSAN: uninit-value in sctp_sf_ootb+0x7f5/0xce0 net/sctp/sm_statefuns.c:3712   sctp_sf_ootb+0x7f5/0xce0 net/sctp/sm_statefuns.c:3712   sctp_do_sm+0x181/0x93d0 net/sctp/sm_sideeffect.c:1166   sctp_endpoint_bh_rcv+0xc38/0xf90 net/sctp/endpointola.c:407   sctp_inq_push+0x2ef/0x380 net/sctp/inqueue.c:88   sctp_rcv+0x3831/0x3b20 net/sctp/input.c:243   sctp4_rcv+0x42/0x50 net/sctp/protocol.c:1159   ip_protocol_deliver_rcu+0xb51/0x13d0 net/ipv4/ip_input.c:205   ip_local_deliver_finish+0x336/0x500 net/ipv4/ip_input.c:233(CVE-2024-50299)\n\nIn the Linux kernel, the following vulnerability has been resolved:  wifi: iwlwifi: mvm: Fix response handling in iwl_mvm_send_recovery_cmd()  1. The size of the response packet is not validated. 2. The response buffer is not freed.  Resolve these issues by switching to iwl_mvm_send_cmd_status(), which handles both size validation and frees the buffer.(CVE-2024-53059)\n\nIn the Linux kernel, the following vulnerability has been resolved:  media: dvbdev: prevent the risk of out of memory access  The dvbdev contains a static variable used to store dvb minors.  The behavior of it depends if CONFIG_DVB_DYNAMIC_MINORS is set or not. When not set, dvb_register_device() won't check for boundaries, as it will rely that a previous call to dvb_register_adapter() would already be enforcing it.  On a similar way, dvb_device_open() uses the assumption that the register functions already did the needed checks.  This can be fragile if some device ends using different calls. This also generate warnings on static check analysers like Coverity.  So, add explicit guards to prevent potential risk of OOM issues.(CVE-2024-53063)\n\nIn the Linux kernel, the following vulnerability has been resolved:  NFSD: Never decrement pending_async_copies on error  The error flow in nfsd4_copy() calls cleanup_async_copy(), which already decrements nn->pending_async_copies.(CVE-2024-53073)\n\nIn the Linux kernel, the following vulnerability has been resolved:  afs: Fix lock recursion  afs_wake_up_async_call() can incur lock recursion.  The problem is that it is called from AF_RXRPC whilst holding the ->notify_lock, but it tries to take a ref on the afs_call struct in order to pass it to a work queue - but if the afs_call is already queued, we then have an extraneous ref that must be put... calling afs_put_call() may call back down into AF_RXRPC through rxrpc_kernel_shutdown_call(), however, which might try taking the ->notify_lock again.  This case isn't very common, however, so defer it to a workqueue.  The oops looks something like:    BUG: spinlock recursion on CPU#0, krxrpcio/7001/1646    lock: 0xffff888141399b30, .magic: dead4ead, .owner: krxrpcio/7001/1646, .owner_cpu: 0   CPU: 0 UID: 0 PID: 1646 Comm: krxrpcio/7001 Not tainted 6.12.0-rc2-build3+ #4351   Hardware name: ASUS All Series/H97-PLUS, BIOS 2306 10/09/2014   Call Trace:    <TASK>    dump_stack_lvl+0x47/0x70    do_raw_spin_lock+0x3c/0x90    rxrpc_kernel_shutdown_call+0x83/0xb0    afs_put_call+0xd7/0x180    rxrpc_notify_socket+0xa0/0x190    rxrpc_input_split_jumbo+0x198/0x1d0    rxrpc_input_data+0x14b/0x1e0    ? rxrpc_input_call_packet+0xc2/0x1f0    rxrpc_input_call_event+0xad/0x6b0    rxrpc_input_packet_on_conn+0x1e1/0x210    rxrpc_input_packet+0x3f2/0x4d0    rxrpc_io_thread+0x243/0x410    ? __pfx_rxrpc_io_thread+0x10/0x10    kthread+0xcf/0xe0    ? __pfx_kthread+0x10/0x10    ret_from_fork+0x24/0x40    ? __pfx_kthread+0x10/0x10    ret_from_fork_asm+0x1a/0x30    </TASK>(CVE-2024-53090)\n\nIn the Linux kernel, the following vulnerability has been resolved:  bpf: Check validity of link->type in bpf_link_show_fdinfo()  If a newly-added link type doesn't invoke BPF_LINK_TYPE(), accessing bpf_link_type_strs[link->type] may result in an out-of-bounds access.  To spot such missed invocations early in the future, checking the validity of link->type in bpf_link_show_fdinfo() and emitting a warning when such invocations are missed.(CVE-2024-53099)\n\nIn the Linux kernel, the following vulnerability has been resolved:  fs: Fix uninitialized value issue in from_kuid and from_kgid  ocfs2_setattr() uses attr->ia_mode, attr->ia_uid and attr->ia_gid in a trace point even though ATTR_MODE, ATTR_UID and ATTR_GID aren't set.  Initialize all fields of newattrs to avoid uninitialized variables, by checking if ATTR_MODE, ATTR_UID, ATTR_GID are initialized, otherwise 0.(CVE-2024-53101)",
				"category":"general",
				"title":"Description"
			},
			{
				"text":"An update for kernel is now available for openEuler-22.03-LTS-SP1.\n\nopenEuler Security has rated this update as having a security impact of high. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.",
				"category":"general",
				"title":"Topic"
			},
			{
				"text":"High",
				"category":"general",
				"title":"Severity"
			},
			{
				"text":"kernel",
				"category":"general",
				"title":"Affected Component"
			}
		],
		"publisher":{
			"issuing_authority":"openEuler security committee",
			"name":"openEuler",
			"namespace":"https://www.openeuler.org",
			"contact_details":"openeuler-security@openeuler.org",
			"category":"vendor"
		},
		"references":[
			{
				"summary":"openEuler-SA-2024-2521",
				"category":"self",
				"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2521"
			},
			{
				"summary":"CVE-2024-44950",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-44950&packageName=kernel"
			},
			{
				"summary":"CVE-2024-46813",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-46813&packageName=kernel"
			},
			{
				"summary":"CVE-2024-47707",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-47707&packageName=kernel"
			},
			{
				"summary":"CVE-2024-47718",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-47718&packageName=kernel"
			},
			{
				"summary":"CVE-2024-49891",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-49891&packageName=kernel"
			},
			{
				"summary":"CVE-2024-49930",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-49930&packageName=kernel"
			},
			{
				"summary":"CVE-2024-49938",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-49938&packageName=kernel"
			},
			{
				"summary":"CVE-2024-49944",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-49944&packageName=kernel"
			},
			{
				"summary":"CVE-2024-49997",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-49997&packageName=kernel"
			},
			{
				"summary":"CVE-2024-50024",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-50024&packageName=kernel"
			},
			{
				"summary":"CVE-2024-50039",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-50039&packageName=kernel"
			},
			{
				"summary":"CVE-2024-50044",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-50044&packageName=kernel"
			},
			{
				"summary":"CVE-2024-50135",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-50135&packageName=kernel"
			},
			{
				"summary":"CVE-2024-50148",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-50148&packageName=kernel"
			},
			{
				"summary":"CVE-2024-50171",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-50171&packageName=kernel"
			},
			{
				"summary":"CVE-2024-50196",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-50196&packageName=kernel"
			},
			{
				"summary":"CVE-2024-50208",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-50208&packageName=kernel"
			},
			{
				"summary":"CVE-2024-50209",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-50209&packageName=kernel"
			},
			{
				"summary":"CVE-2024-50234",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-50234&packageName=kernel"
			},
			{
				"summary":"CVE-2024-50236",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-50236&packageName=kernel"
			},
			{
				"summary":"CVE-2024-50299",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-50299&packageName=kernel"
			},
			{
				"summary":"CVE-2024-53059",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-53059&packageName=kernel"
			},
			{
				"summary":"CVE-2024-53063",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-53063&packageName=kernel"
			},
			{
				"summary":"CVE-2024-53073",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-53073&packageName=kernel"
			},
			{
				"summary":"CVE-2024-53090",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-53090&packageName=kernel"
			},
			{
				"summary":"CVE-2024-53099",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-53099&packageName=kernel"
			},
			{
				"summary":"CVE-2024-53101",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-53101&packageName=kernel"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-44950"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-46813"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-47707"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-47718"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-49891"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-49930"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-49938"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-49944"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-49997"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50024"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50039"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50044"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50135"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50148"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50171"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50196"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50208"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50209"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50234"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50236"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50299"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-53059"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-53063"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-53073"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-53090"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-53099"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-53101"
			},
			{
				"summary":"openEuler-SA-2024-2521 vex file",
				"category":"self",
				"url":"https://repo.openeuler.org/security/data/csaf/advisories/2024/csaf-openeuler-sa-2024-2521.json"
			}
		],
		"title":"An update for kernel is now available for openEuler-22.03-LTS-SP1",
		"tracking":{
			"initial_release_date":"2024-12-06T23:24:02+08:00",
			"revision_history":[
				{
					"date":"2024-12-06T23:24:02+08:00",
					"summary":"Initial",
					"number":"1.0.0"
				}
			],
			"generator":{
				"date":"2024-12-06T23:24:02+08:00",
				"engine":{
					"name":"openEuler CSAF Tool V1.0"
				}
			},
			"current_release_date":"2024-12-06T23:24:02+08:00",
			"id":"openEuler-SA-2024-2521",
			"version":"1.0.0",
			"status":"final"
		}
	},
	"product_tree":{
		"branches":[
			{
				"name":"openEuler",
				"category":"vendor",
				"branches":[
					{
						"name":"openEuler",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP1"
									},
									"product_id":"openEuler-22.03-LTS-SP1",
									"name":"openEuler-22.03-LTS-SP1"
								},
								"name":"openEuler-22.03-LTS-SP1",
								"category":"product_version"
							}
						],
						"category":"product_name"
					},
					{
						"name":"aarch64",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP1"
									},
									"product_id":"kernel-5.10.0-136.104.0.185.oe2203sp1.aarch64.rpm",
									"name":"kernel-5.10.0-136.104.0.185.oe2203sp1.aarch64.rpm"
								},
								"name":"kernel-5.10.0-136.104.0.185.oe2203sp1.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP1"
									},
									"product_id":"kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64.rpm",
									"name":"kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64.rpm"
								},
								"name":"kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP1"
									},
									"product_id":"kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.aarch64.rpm",
									"name":"kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.aarch64.rpm"
								},
								"name":"kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP1"
									},
									"product_id":"kernel-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64.rpm",
									"name":"kernel-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64.rpm"
								},
								"name":"kernel-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP1"
									},
									"product_id":"kernel-headers-5.10.0-136.104.0.185.oe2203sp1.aarch64.rpm",
									"name":"kernel-headers-5.10.0-136.104.0.185.oe2203sp1.aarch64.rpm"
								},
								"name":"kernel-headers-5.10.0-136.104.0.185.oe2203sp1.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP1"
									},
									"product_id":"kernel-source-5.10.0-136.104.0.185.oe2203sp1.aarch64.rpm",
									"name":"kernel-source-5.10.0-136.104.0.185.oe2203sp1.aarch64.rpm"
								},
								"name":"kernel-source-5.10.0-136.104.0.185.oe2203sp1.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP1"
									},
									"product_id":"kernel-tools-5.10.0-136.104.0.185.oe2203sp1.aarch64.rpm",
									"name":"kernel-tools-5.10.0-136.104.0.185.oe2203sp1.aarch64.rpm"
								},
								"name":"kernel-tools-5.10.0-136.104.0.185.oe2203sp1.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP1"
									},
									"product_id":"kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64.rpm",
									"name":"kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64.rpm"
								},
								"name":"kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP1"
									},
									"product_id":"kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64.rpm",
									"name":"kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64.rpm"
								},
								"name":"kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP1"
									},
									"product_id":"perf-5.10.0-136.104.0.185.oe2203sp1.aarch64.rpm",
									"name":"perf-5.10.0-136.104.0.185.oe2203sp1.aarch64.rpm"
								},
								"name":"perf-5.10.0-136.104.0.185.oe2203sp1.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP1"
									},
									"product_id":"perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64.rpm",
									"name":"perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64.rpm"
								},
								"name":"perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP1"
									},
									"product_id":"python3-perf-5.10.0-136.104.0.185.oe2203sp1.aarch64.rpm",
									"name":"python3-perf-5.10.0-136.104.0.185.oe2203sp1.aarch64.rpm"
								},
								"name":"python3-perf-5.10.0-136.104.0.185.oe2203sp1.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP1"
									},
									"product_id":"python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64.rpm",
									"name":"python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64.rpm"
								},
								"name":"python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64.rpm",
								"category":"product_version"
							}
						],
						"category":"architecture"
					},
					{
						"name":"src",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP1"
									},
									"product_id":"kernel-5.10.0-136.104.0.185.oe2203sp1.src.rpm",
									"name":"kernel-5.10.0-136.104.0.185.oe2203sp1.src.rpm"
								},
								"name":"kernel-5.10.0-136.104.0.185.oe2203sp1.src.rpm",
								"category":"product_version"
							}
						],
						"category":"architecture"
					},
					{
						"name":"x86_64",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP1"
									},
									"product_id":"kernel-5.10.0-136.104.0.185.oe2203sp1.x86_64.rpm",
									"name":"kernel-5.10.0-136.104.0.185.oe2203sp1.x86_64.rpm"
								},
								"name":"kernel-5.10.0-136.104.0.185.oe2203sp1.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP1"
									},
									"product_id":"kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64.rpm",
									"name":"kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64.rpm"
								},
								"name":"kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP1"
									},
									"product_id":"kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.x86_64.rpm",
									"name":"kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.x86_64.rpm"
								},
								"name":"kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP1"
									},
									"product_id":"kernel-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64.rpm",
									"name":"kernel-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64.rpm"
								},
								"name":"kernel-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP1"
									},
									"product_id":"kernel-headers-5.10.0-136.104.0.185.oe2203sp1.x86_64.rpm",
									"name":"kernel-headers-5.10.0-136.104.0.185.oe2203sp1.x86_64.rpm"
								},
								"name":"kernel-headers-5.10.0-136.104.0.185.oe2203sp1.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP1"
									},
									"product_id":"kernel-source-5.10.0-136.104.0.185.oe2203sp1.x86_64.rpm",
									"name":"kernel-source-5.10.0-136.104.0.185.oe2203sp1.x86_64.rpm"
								},
								"name":"kernel-source-5.10.0-136.104.0.185.oe2203sp1.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP1"
									},
									"product_id":"kernel-tools-5.10.0-136.104.0.185.oe2203sp1.x86_64.rpm",
									"name":"kernel-tools-5.10.0-136.104.0.185.oe2203sp1.x86_64.rpm"
								},
								"name":"kernel-tools-5.10.0-136.104.0.185.oe2203sp1.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP1"
									},
									"product_id":"kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64.rpm",
									"name":"kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64.rpm"
								},
								"name":"kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP1"
									},
									"product_id":"kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64.rpm",
									"name":"kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64.rpm"
								},
								"name":"kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP1"
									},
									"product_id":"perf-5.10.0-136.104.0.185.oe2203sp1.x86_64.rpm",
									"name":"perf-5.10.0-136.104.0.185.oe2203sp1.x86_64.rpm"
								},
								"name":"perf-5.10.0-136.104.0.185.oe2203sp1.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP1"
									},
									"product_id":"perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64.rpm",
									"name":"perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64.rpm"
								},
								"name":"perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP1"
									},
									"product_id":"python3-perf-5.10.0-136.104.0.185.oe2203sp1.x86_64.rpm",
									"name":"python3-perf-5.10.0-136.104.0.185.oe2203sp1.x86_64.rpm"
								},
								"name":"python3-perf-5.10.0-136.104.0.185.oe2203sp1.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP1"
									},
									"product_id":"python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64.rpm",
									"name":"python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64.rpm"
								},
								"name":"python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64.rpm",
								"category":"product_version"
							}
						],
						"category":"architecture"
					}
				]
			}
		],
		"relationships":[
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP1",
				"product_reference":"kernel-5.10.0-136.104.0.185.oe2203sp1.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"name":"kernel-5.10.0-136.104.0.185.oe2203sp1.aarch64 as a component of openEuler-22.03-LTS-SP1"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP1",
				"product_reference":"kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"name":"kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64 as a component of openEuler-22.03-LTS-SP1"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP1",
				"product_reference":"kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"name":"kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.aarch64 as a component of openEuler-22.03-LTS-SP1"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP1",
				"product_reference":"kernel-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"name":"kernel-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64 as a component of openEuler-22.03-LTS-SP1"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP1",
				"product_reference":"kernel-headers-5.10.0-136.104.0.185.oe2203sp1.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"name":"kernel-headers-5.10.0-136.104.0.185.oe2203sp1.aarch64 as a component of openEuler-22.03-LTS-SP1"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP1",
				"product_reference":"kernel-source-5.10.0-136.104.0.185.oe2203sp1.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"name":"kernel-source-5.10.0-136.104.0.185.oe2203sp1.aarch64 as a component of openEuler-22.03-LTS-SP1"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP1",
				"product_reference":"kernel-tools-5.10.0-136.104.0.185.oe2203sp1.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"name":"kernel-tools-5.10.0-136.104.0.185.oe2203sp1.aarch64 as a component of openEuler-22.03-LTS-SP1"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP1",
				"product_reference":"kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"name":"kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64 as a component of openEuler-22.03-LTS-SP1"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP1",
				"product_reference":"kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"name":"kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64 as a component of openEuler-22.03-LTS-SP1"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP1",
				"product_reference":"perf-5.10.0-136.104.0.185.oe2203sp1.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP1:perf-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"name":"perf-5.10.0-136.104.0.185.oe2203sp1.aarch64 as a component of openEuler-22.03-LTS-SP1"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP1",
				"product_reference":"perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"name":"perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64 as a component of openEuler-22.03-LTS-SP1"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP1",
				"product_reference":"python3-perf-5.10.0-136.104.0.185.oe2203sp1.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"name":"python3-perf-5.10.0-136.104.0.185.oe2203sp1.aarch64 as a component of openEuler-22.03-LTS-SP1"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP1",
				"product_reference":"python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"name":"python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64 as a component of openEuler-22.03-LTS-SP1"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP1",
				"product_reference":"kernel-5.10.0-136.104.0.185.oe2203sp1.src.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.src",
					"name":"kernel-5.10.0-136.104.0.185.oe2203sp1.src as a component of openEuler-22.03-LTS-SP1"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP1",
				"product_reference":"kernel-5.10.0-136.104.0.185.oe2203sp1.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"name":"kernel-5.10.0-136.104.0.185.oe2203sp1.x86_64 as a component of openEuler-22.03-LTS-SP1"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP1",
				"product_reference":"kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"name":"kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64 as a component of openEuler-22.03-LTS-SP1"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP1",
				"product_reference":"kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"name":"kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.x86_64 as a component of openEuler-22.03-LTS-SP1"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP1",
				"product_reference":"kernel-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"name":"kernel-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64 as a component of openEuler-22.03-LTS-SP1"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP1",
				"product_reference":"kernel-headers-5.10.0-136.104.0.185.oe2203sp1.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"name":"kernel-headers-5.10.0-136.104.0.185.oe2203sp1.x86_64 as a component of openEuler-22.03-LTS-SP1"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP1",
				"product_reference":"kernel-source-5.10.0-136.104.0.185.oe2203sp1.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"name":"kernel-source-5.10.0-136.104.0.185.oe2203sp1.x86_64 as a component of openEuler-22.03-LTS-SP1"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP1",
				"product_reference":"kernel-tools-5.10.0-136.104.0.185.oe2203sp1.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"name":"kernel-tools-5.10.0-136.104.0.185.oe2203sp1.x86_64 as a component of openEuler-22.03-LTS-SP1"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP1",
				"product_reference":"kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"name":"kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64 as a component of openEuler-22.03-LTS-SP1"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP1",
				"product_reference":"kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"name":"kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64 as a component of openEuler-22.03-LTS-SP1"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP1",
				"product_reference":"perf-5.10.0-136.104.0.185.oe2203sp1.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP1:perf-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"name":"perf-5.10.0-136.104.0.185.oe2203sp1.x86_64 as a component of openEuler-22.03-LTS-SP1"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP1",
				"product_reference":"perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"name":"perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64 as a component of openEuler-22.03-LTS-SP1"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP1",
				"product_reference":"python3-perf-5.10.0-136.104.0.185.oe2203sp1.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"name":"python3-perf-5.10.0-136.104.0.185.oe2203sp1.x86_64 as a component of openEuler-22.03-LTS-SP1"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP1",
				"product_reference":"python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"name":"python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64 as a component of openEuler-22.03-LTS-SP1"
				},
				"category":"default_component_of"
			}
		]
	},
	"vulnerabilities":[
		{
			"cve":"CVE-2024-44950",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nserial: sc16is7xx: fix invalid FIFO access with special register set\n\nWhen enabling access to the special register set, Receiver time-out and\nRHR interrupts can happen. In this case, the IRQ handler will try to read\nfrom the FIFO thru the RHR register at address 0x00, but address 0x00 is\nmapped to DLL register, resulting in erroneous FIFO reading.\n\nCall graph example:\n    sc16is7xx_startup(): entry\n    sc16is7xx_ms_proc(): entry\n    sc16is7xx_set_termios(): entry\n    sc16is7xx_set_baud(): DLH/DLL = $009C --> access special register set\n    sc16is7xx_port_irq() entry            --> IIR is 0x0C\n    sc16is7xx_handle_rx() entry\n    sc16is7xx_fifo_read(): --> unable to access FIFO (RHR) because it is\n                               mapped to DLL (LCR=LCR_CONF_MODE_A)\n    sc16is7xx_set_baud(): exit --> Restore access to general register set\n\nFix the problem by claiming the efr_lock mutex when accessing the Special\nregister set.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:perf-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.src",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:perf-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2521"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-44950"
		},
		{
			"cve":"CVE-2024-46813",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Check link_index before accessing dc->links[]\n\n[WHY & HOW]\ndc->links[] has max size of MAX_LINKS and NULL is return when trying to\naccess with out-of-bound index.\n\nThis fixes 3 OVERRUN and 1 RESOURCE_LEAK issues reported by Coverity.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:perf-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.src",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:perf-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2521"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.8,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2024-46813"
		},
		{
			"cve":"CVE-2024-47707",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nipv6: avoid possible NULL deref in rt6_uncached_list_flush_dev()\n\nBlamed commit accidentally removed a check for rt->rt6i_idev being NULL,\nas spotted by syzbot:\n\nOops: general protection fault, probably for non-canonical address 0xdffffc0000000000: 0000 [#1] PREEMPT SMP KASAN PTI\nKASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007]\nCPU: 1 UID: 0 PID: 10998 Comm: syz-executor Not tainted 6.11.0-rc6-syzkaller-00208-g625403177711 #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024\n RIP: 0010:rt6_uncached_list_flush_dev net/ipv6/route.c:177 [inline]\n RIP: 0010:rt6_disable_ip+0x33e/0x7e0 net/ipv6/route.c:4914\nCode: 41 80 3c 04 00 74 0a e8 90 d0 9b f7 48 8b 7c 24 08 48 8b 07 48 89 44 24 10 4c 89 f0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <80> 3c 08 00 74 08 4c 89 f7 e8 64 d0 9b f7 48 8b 44 24 18 49 39 06\nRSP: 0018:ffffc900047374e0 EFLAGS: 00010246\nRAX: 0000000000000000 RBX: 1ffff1100fdf8f33 RCX: dffffc0000000000\nRDX: 0000000000000000 RSI: 0000000000000004 RDI: ffff88807efc78c0\nRBP: ffffc900047375d0 R08: 0000000000000003 R09: fffff520008e6e8c\nR10: dffffc0000000000 R11: fffff520008e6e8c R12: 1ffff1100fdf8f18\nR13: ffff88807efc7998 R14: 0000000000000000 R15: ffff88807efc7930\nFS:  0000000000000000(0000) GS:ffff8880b8900000(0000) knlGS:0000000000000000\nCS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000000020002a80 CR3: 0000000022f62000 CR4: 00000000003506f0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nCall Trace:\n <TASK>\n  addrconf_ifdown+0x15d/0x1bd0 net/ipv6/addrconf.c:3856\n addrconf_notify+0x3cb/0x1020\n  notifier_call_chain+0x19f/0x3e0 kernel/notifier.c:93\n  call_netdevice_notifiers_extack net/core/dev.c:2032 [inline]\n  call_netdevice_notifiers net/core/dev.c:2046 [inline]\n  unregister_netdevice_many_notify+0xd81/0x1c40 net/core/dev.c:11352\n  unregister_netdevice_many net/core/dev.c:11414 [inline]\n  unregister_netdevice_queue+0x303/0x370 net/core/dev.c:11289\n  unregister_netdevice include/linux/netdevice.h:3129 [inline]\n  __tun_detach+0x6b9/0x1600 drivers/net/tun.c:685\n  tun_detach drivers/net/tun.c:701 [inline]\n  tun_chr_close+0x108/0x1b0 drivers/net/tun.c:3510\n  __fput+0x24a/0x8a0 fs/file_table.c:422\n  task_work_run+0x24f/0x310 kernel/task_work.c:228\n  exit_task_work include/linux/task_work.h:40 [inline]\n  do_exit+0xa2f/0x27f0 kernel/exit.c:882\n  do_group_exit+0x207/0x2c0 kernel/exit.c:1031\n  __do_sys_exit_group kernel/exit.c:1042 [inline]\n  __se_sys_exit_group kernel/exit.c:1040 [inline]\n  __x64_sys_exit_group+0x3f/0x40 kernel/exit.c:1040\n  x64_sys_call+0x2634/0x2640 arch/x86/include/generated/asm/syscalls_64.h:232\n  do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n  do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\nRIP: 0033:0x7f1acc77def9\nCode: Unable to access opcode bytes at 0x7f1acc77decf.\nRSP: 002b:00007ffeb26fa738 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7\nRAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f1acc77def9\nRDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000043\nRBP: 00007f1acc7dd508 R08: 00007ffeb26f84d7 R09: 0000000000000003\nR10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001\nR13: 0000000000000003 R14: 00000000ffffffff R15: 00007ffeb26fa8e0\n </TASK>\nModules linked in:\n---[ end trace 0000000000000000 ]---\n RIP: 0010:rt6_uncached_list_flush_dev net/ipv6/route.c:177 [inline]\n RIP: 0010:rt6_disable_ip+0x33e/0x7e0 net/ipv6/route.c:4914\nCode: 41 80 3c 04 00 74 0a e8 90 d0 9b f7 48 8b 7c 24 08 48 8b 07 48 89 44 24 10 4c 89 f0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <80> 3c 08 00 74 08 4c 89 f7 e8 64 d0 9b f7 48 8b 44 24 18 49 39 06\nRSP: 0018:ffffc900047374e0 EFLAGS: 00010246\nRAX: 0000000000000000 RBX: 1ffff1100fdf8f33 RCX: dffffc0000000000\nRDX: 0000000000000000 RSI: 0000000000000004 RDI: ffff88807efc78c0\nR\n---truncated---",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:perf-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.src",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:perf-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2521"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-47707"
		},
		{
			"cve":"CVE-2024-47718",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: rtw88: always wait for both firmware loading attempts\n\nIn 'rtw_wait_firmware_completion()', always wait for both (regular and\nwowlan) firmware loading attempts. Otherwise if 'rtw_usb_intf_init()'\nhas failed in 'rtw_usb_probe()', 'rtw_usb_disconnect()' may issue\n'ieee80211_free_hw()' when one of 'rtw_load_firmware_cb()' (usually\nthe wowlan one) is still in progress, causing UAF detected by KASAN.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:perf-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.src",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:perf-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2521"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.8,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2024-47718"
		},
		{
			"cve":"CVE-2024-49891",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: lpfc: Validate hdwq pointers before dereferencing in reset/errata paths\n\nWhen the HBA is undergoing a reset or is handling an errata event, NULL ptr\ndereference crashes may occur in routines such as\nlpfc_sli_flush_io_rings(), lpfc_dev_loss_tmo_callbk(), or\nlpfc_abort_handler().\n\nAdd NULL ptr checks before dereferencing hdwq pointers that may have been\nfreed due to operations colliding with a reset or errata event handler.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:perf-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.src",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:perf-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2521"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-49891"
		},
		{
			"cve":"CVE-2024-49930",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: ath11k: fix array out-of-bound access in SoC stats\n\nCurrently, the ath11k_soc_dp_stats::hal_reo_error array is defined with a\nmaximum size of DP_REO_DST_RING_MAX. However, the ath11k_dp_process_rx()\nfunction access ath11k_soc_dp_stats::hal_reo_error using the REO\ndestination SRNG ring ID, which is incorrect. SRNG ring ID differ from\nnormal ring ID, and this usage leads to out-of-bounds array access. To fix\nthis issue, modify ath11k_dp_process_rx() to use the normal ring ID\ndirectly instead of the SRNG ring ID to avoid out-of-bounds array access.\n\nTested-on: QCN9074 hw1.0 PCI WLAN.HK.2.7.0.1-01744-QCAHKSWPL_SILICONZ-1",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:perf-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.src",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:perf-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2521"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.8,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2024-49930"
		},
		{
			"cve":"CVE-2024-49938",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: ath9k_htc: Use __skb_set_length() for resetting urb before resubmit\n\nSyzbot points out that skb_trim() has a sanity check on the existing length of\nthe skb, which can be uninitialised in some error paths. The intent here is\nclearly just to reset the length to zero before resubmitting, so switch to\ncalling __skb_set_length(skb, 0) directly. In addition, __skb_set_length()\nalready contains a call to skb_reset_tail_pointer(), so remove the redundant\ncall.\n\nThe syzbot report came from ath9k_hif_usb_reg_in_cb(), but there's a similar\nusage of skb_trim() in ath9k_hif_usb_rx_cb(), change both while we're at it.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:perf-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.src",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:perf-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2521"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-49938"
		},
		{
			"cve":"CVE-2024-49944",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nsctp: set sk_state back to CLOSED if autobind fails in sctp_listen_start\n\nIn sctp_listen_start() invoked by sctp_inet_listen(), it should set the\nsk_state back to CLOSED if sctp_autobind() fails due to whatever reason.\n\nOtherwise, next time when calling sctp_inet_listen(), if sctp_sk(sk)->reuse\nis already set via setsockopt(SCTP_REUSE_PORT), sctp_sk(sk)->bind_hash will\nbe dereferenced as sk_state is LISTENING, which causes a crash as bind_hash\nis NULL.\n\n  KASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007]\n  RIP: 0010:sctp_inet_listen+0x7f0/0xa20 net/sctp/socket.c:8617\n  Call Trace:\n   <TASK>\n   __sys_listen_socket net/socket.c:1883 [inline]\n   __sys_listen+0x1b7/0x230 net/socket.c:1894\n   __do_sys_listen net/socket.c:1902 [inline]",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:perf-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.src",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:perf-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2521"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-49944"
		},
		{
			"cve":"CVE-2024-49997",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nnet: ethernet: lantiq_etop: fix memory disclosure\n\nWhen applying padding, the buffer is not zeroed, which results in memory\ndisclosure. The mentioned data is observed on the wire. This patch uses\nskb_put_padto() to pad Ethernet frames properly. The mentioned function\nzeroes the expanded buffer.\n\nIn case the packet cannot be padded it is silently dropped. Statistics\nare also not incremented. This driver does not support statistics in the\nold 32-bit format or the new 64-bit format. These will be added in the\nfuture. In its current form, the patch should be easily backported to\nstable versions.\n\nEthernet MACs on Amazon-SE and Danube cannot do padding of the packets\nin hardware, so software padding must be applied.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:perf-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.src",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:perf-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2521"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.5,
						"vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2024-49997"
		},
		{
			"cve":"CVE-2024-50024",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nnet: Fix an unsafe loop on the list\n\nThe kernel may crash when deleting a genetlink family if there are still\nlisteners for that family:\n\nOops: Kernel access of bad area, sig: 11 [#1]\n  ...\n  NIP [c000000000c080bc] netlink_update_socket_mc+0x3c/0xc0\n  LR [c000000000c0f764] __netlink_clear_multicast_users+0x74/0xc0\n  Call Trace:\n__netlink_clear_multicast_users+0x74/0xc0\ngenl_unregister_family+0xd4/0x2d0\n\nChange the unsafe loop on the list to a safe one, because inside the\nloop there is an element removal from this list.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:perf-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.src",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:perf-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2521"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-50024"
		},
		{
			"cve":"CVE-2024-50039",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: accept TCA_STAB only for root qdisc\n\nMost qdiscs maintain their backlog using qdisc_pkt_len(skb)\non the assumption it is invariant between the enqueue()\nand dequeue() handlers.\n\nUnfortunately syzbot can crash a host rather easily using\na TBF + SFQ combination, with an STAB on SFQ [1]\n\nWe can't support TCA_STAB on arbitrary level, this would\nrequire to maintain per-qdisc storage.\n\n[1]\n[   88.796496] BUG: kernel NULL pointer dereference, address: 0000000000000000\n[   88.798611] #PF: supervisor read access in kernel mode\n[   88.799014] #PF: error_code(0x0000) - not-present page\n[   88.799506] PGD 0 P4D 0\n[   88.799829] Oops: Oops: 0000 [#1] SMP NOPTI\n[   88.800569] CPU: 14 UID: 0 PID: 2053 Comm: b371744477 Not tainted 6.12.0-rc1-virtme #1117\n[   88.801107] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.3-debian-1.16.3-2 04/01/2014\n[   88.801779] RIP: 0010:sfq_dequeue (net/sched/sch_sfq.c:272 net/sched/sch_sfq.c:499) sch_sfq\n[ 88.802544] Code: 0f b7 50 12 48 8d 04 d5 00 00 00 00 48 89 d6 48 29 d0 48 8b 91 c0 01 00 00 48 c1 e0 03 48 01 c2 66 83 7a 1a 00 7e c0 48 8b 3a <4c> 8b 07 4c 89 02 49 89 50 08 48 c7 47 08 00 00 00 00 48 c7 07 00\nAll code\n========\n   0:\t0f b7 50 12          \tmovzwl 0x12(%rax),%edx\n   4:\t48 8d 04 d5 00 00 00 \tlea    0x0(,%rdx,8),%rax\n   b:\t00\n   c:\t48 89 d6             \tmov    %rdx,%rsi\n   f:\t48 29 d0             \tsub    %rdx,%rax\n  12:\t48 8b 91 c0 01 00 00 \tmov    0x1c0(%rcx),%rdx\n  19:\t48 c1 e0 03          \tshl    $0x3,%rax\n  1d:\t48 01 c2             \tadd    %rax,%rdx\n  20:\t66 83 7a 1a 00       \tcmpw   $0x0,0x1a(%rdx)\n  25:\t7e c0                \tjle    0xffffffffffffffe7\n  27:\t48 8b 3a             \tmov    (%rdx),%rdi\n  2a:*\t4c 8b 07             \tmov    (%rdi),%r8\t\t<-- trapping instruction\n  2d:\t4c 89 02             \tmov    %r8,(%rdx)\n  30:\t49 89 50 08          \tmov    %rdx,0x8(%r8)\n  34:\t48 c7 47 08 00 00 00 \tmovq   $0x0,0x8(%rdi)\n  3b:\t00\n  3c:\t48                   \trex.W\n  3d:\tc7                   \t.byte 0xc7\n  3e:\t07                   \t(bad)\n\t...\n\nCode starting with the faulting instruction\n===========================================\n   0:\t4c 8b 07             \tmov    (%rdi),%r8\n   3:\t4c 89 02             \tmov    %r8,(%rdx)\n   6:\t49 89 50 08          \tmov    %rdx,0x8(%r8)\n   a:\t48 c7 47 08 00 00 00 \tmovq   $0x0,0x8(%rdi)\n  11:\t00\n  12:\t48                   \trex.W\n  13:\tc7                   \t.byte 0xc7\n  14:\t07                   \t(bad)\n\t...\n[   88.803721] RSP: 0018:ffff9a1f892b7d58 EFLAGS: 00000206\n[   88.804032] RAX: 0000000000000000 RBX: ffff9a1f8420c800 RCX: ffff9a1f8420c800\n[   88.804560] RDX: ffff9a1f81bc1440 RSI: 0000000000000000 RDI: 0000000000000000\n[   88.805056] RBP: ffffffffc04bb0e0 R08: 0000000000000001 R09: 00000000ff7f9a1f\n[   88.805473] R10: 000000000001001b R11: 0000000000009a1f R12: 0000000000000140\n[   88.806194] R13: 0000000000000001 R14: ffff9a1f886df400 R15: ffff9a1f886df4ac\n[   88.806734] FS:  00007f445601a740(0000) GS:ffff9a2e7fd80000(0000) knlGS:0000000000000000\n[   88.807225] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[   88.807672] CR2: 0000000000000000 CR3: 000000050cc46000 CR4: 00000000000006f0\n[   88.808165] Call Trace:\n[   88.808459]  <TASK>\n[   88.808710] ? __die (arch/x86/kernel/dumpstack.c:421 arch/x86/kernel/dumpstack.c:434)\n[   88.809261] ? page_fault_oops (arch/x86/mm/fault.c:715)\n[   88.809561] ? exc_page_fault (./arch/x86/include/asm/irqflags.h:26 ./arch/x86/include/asm/irqflags.h:87 ./arch/x86/include/asm/irqflags.h:147 arch/x86/mm/fault.c:1489 arch/x86/mm/fault.c:1539)\n[   88.809806] ? asm_exc_page_fault (./arch/x86/include/asm/idtentry.h:623)\n[   88.810074] ? sfq_dequeue (net/sched/sch_sfq.c:272 net/sched/sch_sfq.c:499) sch_sfq\n[   88.810411] sfq_reset (net/sched/sch_sfq.c:525) sch_sfq\n[   88.810671] qdisc_reset (./include/linux/skbuff.h:2135 ./include/linux/skbuff.h:2441 ./include/linux/skbuff.h:3304 ./include/linux/skbuff.h:3310 net/sched/sch_g\n---truncated---",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:perf-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.src",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:perf-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2521"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-50039"
		},
		{
			"cve":"CVE-2024-50044",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: RFCOMM: FIX possible deadlock in rfcomm_sk_state_change\n\nrfcomm_sk_state_change attempts to use sock_lock so it must never be\ncalled with it locked but rfcomm_sock_ioctl always attempt to lock it\ncausing the following trace:\n\n======================================================\nWARNING: possible circular locking dependency detected\n6.8.0-syzkaller-08951-gfe46a7dd189e #0 Not tainted\n------------------------------------------------------\nsyz-executor386/5093 is trying to acquire lock:\nffff88807c396258 (sk_lock-AF_BLUETOOTH-BTPROTO_RFCOMM){+.+.}-{0:0}, at: lock_sock include/net/sock.h:1671 [inline]\nffff88807c396258 (sk_lock-AF_BLUETOOTH-BTPROTO_RFCOMM){+.+.}-{0:0}, at: rfcomm_sk_state_change+0x5b/0x310 net/bluetooth/rfcomm/sock.c:73\n\nbut task is already holding lock:\nffff88807badfd28 (&d->lock){+.+.}-{3:3}, at: __rfcomm_dlc_close+0x226/0x6a0 net/bluetooth/rfcomm/core.c:491",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:perf-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.src",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:perf-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2521"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"LOW",
						"baseScore":3.3,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Low",
					"category":"impact"
				}
			],
			"title":"CVE-2024-50044"
		},
		{
			"cve":"CVE-2024-50135",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nnvme-pci: fix race condition between reset and nvme_dev_disable()\n\nnvme_dev_disable() modifies the dev->online_queues field, therefore\nnvme_pci_update_nr_queues() should avoid racing against it, otherwise\nwe could end up passing invalid values to blk_mq_update_nr_hw_queues().\n\n WARNING: CPU: 39 PID: 61303 at drivers/pci/msi/api.c:347\n          pci_irq_get_affinity+0x187/0x210\n Workqueue: nvme-reset-wq nvme_reset_work [nvme]\n RIP: 0010:pci_irq_get_affinity+0x187/0x210\n Call Trace:\n  <TASK>\n  ? blk_mq_pci_map_queues+0x87/0x3c0\n  ? pci_irq_get_affinity+0x187/0x210\n  blk_mq_pci_map_queues+0x87/0x3c0\n  nvme_pci_map_queues+0x189/0x460 [nvme]\n  blk_mq_update_nr_hw_queues+0x2a/0x40\n  nvme_reset_work+0x1be/0x2a0 [nvme]\n\nFix the bug by locking the shutdown_lock mutex before using\ndev->online_queues. Give up if nvme_dev_disable() is running or if\nit has been executed already.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:perf-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.src",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:perf-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2521"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":4.7,
						"vectorString":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-50135"
		},
		{
			"cve":"CVE-2024-50148",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: bnep: fix wild-memory-access in proto_unregister\n\nThere's issue as follows:\n  KASAN: maybe wild-memory-access in range [0xdead...108-0xdead...10f]\n  CPU: 3 UID: 0 PID: 2805 Comm: rmmod Tainted: G        W\n  RIP: 0010:proto_unregister+0xee/0x400\n  Call Trace:\n   <TASK>\n   __do_sys_delete_module+0x318/0x580\n   do_syscall_64+0xc1/0x1d0\n   entry_SYSCALL_64_after_hwframe+0x77/0x7f\n\nAs bnep_init() ignore bnep_sock_init()'s return value, and bnep_sock_init()\nwill cleanup all resource. Then when remove bnep module will call\nbnep_sock_cleanup() to cleanup sock's resource.\nTo solve above issue just return bnep_sock_init()'s return value in\nbnep_exit().",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:perf-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.src",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:perf-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2521"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-50148"
		},
		{
			"cve":"CVE-2024-50171",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nnet: systemport: fix potential memory leak in bcm_sysport_xmit()\n\nThe bcm_sysport_xmit() returns NETDEV_TX_OK without freeing skb\nin case of dma_map_single() fails, add dev_kfree_skb() to fix it.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:perf-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.src",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:perf-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2521"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-50171"
		},
		{
			"cve":"CVE-2024-50196",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\npinctrl: ocelot: fix system hang on level based interrupts\n\nThe current implementation only calls chained_irq_enter() and\nchained_irq_exit() if it detects pending interrupts.\n\n```\nfor (i = 0; i < info->stride; i++) {\n\turegmap_read(info->map, id_reg + 4 * i, &reg);\n\tif (!reg)\n\t\tcontinue;\n\n\tchained_irq_enter(parent_chip, desc);\n```\n\nHowever, in case of GPIO pin configured in level mode and the parent\ncontroller configured in edge mode, GPIO interrupt might be lowered by the\nhardware. In the result, if the interrupt is short enough, the parent\ninterrupt is still pending while the GPIO interrupt is cleared;\nchained_irq_enter() never gets called and the system hangs trying to\nservice the parent interrupt.\n\nMoving chained_irq_enter() and chained_irq_exit() outside the for loop\nensures that they are called even when GPIO interrupt is lowered by the\nhardware.\n\nThe similar code with chained_irq_enter() / chained_irq_exit() functions\nwrapping interrupt checking loop may be found in many other drivers:\n```\ngrep -r -A 10 chained_irq_enter drivers/pinctrl\n```",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:perf-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.src",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:perf-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2521"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-50196"
		},
		{
			"cve":"CVE-2024-50208",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/bnxt_re: Fix a bug while setting up Level-2 PBL pages\n\nAvoid memory corruption while setting up Level-2 PBL pages for the non MR\nresources when num_pages > 256K.\n\nThere will be a single PDE page address (contiguous pages in the case of >\nPAGE_SIZE), but, current logic assumes multiple pages, leading to invalid\nmemory access after 256K PBL entries in the PDE.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:perf-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.src",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:perf-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2521"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-50208"
		},
		{
			"cve":"CVE-2024-50209",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/bnxt_re: Add a check for memory allocation\n\n__alloc_pbl() can return error when memory allocation fails.\nDriver is not checking the status on one of the instances.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:perf-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.src",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:perf-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2521"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.8,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2024-50209"
		},
		{
			"cve":"CVE-2024-50234",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: iwlegacy: Clear stale interrupts before resuming device\n\niwl4965 fails upon resume from hibernation on my laptop. The reason\nseems to be a stale interrupt which isn't being cleared out before\ninterrupts are enabled. We end up with a race beween the resume\ntrying to bring things back up, and the restart work (queued form\nthe interrupt handler) trying to bring things down. Eventually\nthe whole thing blows up.\n\nFix the problem by clearing out any stale interrupts before\ninterrupts get enabled during resume.\n\nHere's a debug log of the indicent:\n[   12.042589] ieee80211 phy0: il_isr ISR inta 0x00000080, enabled 0xaa00008b, fh 0x00000000\n[   12.042625] ieee80211 phy0: il4965_irq_tasklet inta 0x00000080, enabled 0x00000000, fh 0x00000000\n[   12.042651] iwl4965 0000:10:00.0: RF_KILL bit toggled to enable radio.\n[   12.042653] iwl4965 0000:10:00.0: On demand firmware reload\n[   12.042690] ieee80211 phy0: il4965_irq_tasklet End inta 0x00000000, enabled 0xaa00008b, fh 0x00000000, flags 0x00000282\n[   12.052207] ieee80211 phy0: il4965_mac_start enter\n[   12.052212] ieee80211 phy0: il_prep_station Add STA to driver ID 31: ff:ff:ff:ff:ff:ff\n[   12.052244] ieee80211 phy0: il4965_set_hw_ready hardware  ready\n[   12.052324] ieee80211 phy0: il_apm_init Init card's basic functions\n[   12.052348] ieee80211 phy0: il_apm_init L1 Enabled; Disabling L0S\n[   12.055727] ieee80211 phy0: il4965_load_bsm Begin load bsm\n[   12.056140] ieee80211 phy0: il4965_verify_bsm Begin verify bsm\n[   12.058642] ieee80211 phy0: il4965_verify_bsm BSM bootstrap uCode image OK\n[   12.058721] ieee80211 phy0: il4965_load_bsm BSM write complete, poll 1 iterations\n[   12.058734] ieee80211 phy0: __il4965_up iwl4965 is coming up\n[   12.058737] ieee80211 phy0: il4965_mac_start Start UP work done.\n[   12.058757] ieee80211 phy0: __il4965_down iwl4965 is going down\n[   12.058761] ieee80211 phy0: il_scan_cancel_timeout Scan cancel timeout\n[   12.058762] ieee80211 phy0: il_do_scan_abort Not performing scan to abort\n[   12.058765] ieee80211 phy0: il_clear_ucode_stations Clearing ucode stations in driver\n[   12.058767] ieee80211 phy0: il_clear_ucode_stations No active stations found to be cleared\n[   12.058819] ieee80211 phy0: _il_apm_stop Stop card, put in low power state\n[   12.058827] ieee80211 phy0: _il_apm_stop_master stop master\n[   12.058864] ieee80211 phy0: il4965_clear_free_frames 0 frames on pre-allocated heap on clear.\n[   12.058869] ieee80211 phy0: Hardware restart was requested\n[   16.132299] iwl4965 0000:10:00.0: START_ALIVE timeout after 4000ms.\n[   16.132303] ------------[ cut here ]------------\n[   16.132304] Hardware became unavailable upon resume. This could be a software issue prior to suspend or a hardware issue.\n[   16.132338] WARNING: CPU: 0 PID: 181 at net/mac80211/util.c:1826 ieee80211_reconfig+0x8f/0x14b0 [mac80211]\n[   16.132390] Modules linked in: ctr ccm sch_fq_codel xt_tcpudp xt_multiport xt_state iptable_filter iptable_nat nf_nat nf_conntrack nf_defrag_ipv4 ip_tables x_tables binfmt_misc joydev mousedev btusb btrtl btintel btbcm bluetooth ecdh_generic ecc iTCO_wdt i2c_dev iwl4965 iwlegacy coretemp snd_hda_codec_analog pcspkr psmouse mac80211 snd_hda_codec_generic libarc4 sdhci_pci cqhci sha256_generic sdhci libsha256 firewire_ohci snd_hda_intel snd_intel_dspcfg mmc_core snd_hda_codec snd_hwdep firewire_core led_class iosf_mbi snd_hda_core uhci_hcd lpc_ich crc_itu_t cfg80211 ehci_pci ehci_hcd snd_pcm usbcore mfd_core rfkill snd_timer snd usb_common soundcore video parport_pc parport intel_agp wmi intel_gtt backlight e1000e agpgart evdev\n[   16.132456] CPU: 0 UID: 0 PID: 181 Comm: kworker/u8:6 Not tainted 6.11.0-cl+ #143\n[   16.132460] Hardware name: Hewlett-Packard HP Compaq 6910p/30BE, BIOS 68MCU Ver. F.19 07/06/2010\n[   16.132463] Workqueue: async async_run_entry_fn\n[   16.132469] RIP: 0010:ieee80211_reconfig+0x8f/0x14b0 [mac80211]\n[   16.132501] Code: da 02 00 0\n---truncated---",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:perf-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.src",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:perf-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2521"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.0,
						"vectorString":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2024-50234"
		},
		{
			"cve":"CVE-2024-50236",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: ath10k: Fix memory leak in management tx\n\nIn the current logic, memory is allocated for storing the MSDU context\nduring management packet TX but this memory is not being freed during\nmanagement TX completion. Similar leaks are seen in the management TX\ncleanup logic.\n\nKmemleak reports this problem as below,\n\nunreferenced object 0xffffff80b64ed250 (size 16):\n  comm \"kworker/u16:7\", pid 148, jiffies 4294687130 (age 714.199s)\n  hex dump (first 16 bytes):\n    00 2b d8 d8 80 ff ff ff c4 74 e9 fd 07 00 00 00  .+.......t......\n  backtrace:\n    [<ffffffe6e7b245dc>] __kmem_cache_alloc_node+0x1e4/0x2d8\n    [<ffffffe6e7adde88>] kmalloc_trace+0x48/0x110\n    [<ffffffe6bbd765fc>] ath10k_wmi_tlv_op_gen_mgmt_tx_send+0xd4/0x1d8 [ath10k_core]\n    [<ffffffe6bbd3eed4>] ath10k_mgmt_over_wmi_tx_work+0x134/0x298 [ath10k_core]\n    [<ffffffe6e78d5974>] process_scheduled_works+0x1ac/0x400\n    [<ffffffe6e78d60b8>] worker_thread+0x208/0x328\n    [<ffffffe6e78dc890>] kthread+0x100/0x1c0\n    [<ffffffe6e78166c0>] ret_from_fork+0x10/0x20\n\nFree the memory during completion and cleanup to fix the leak.\n\nProtect the mgmt_pending_tx idr_remove() operation in\nath10k_wmi_tlv_op_cleanup_mgmt_tx_send() using ar->data_lock similar to\nother instances.\n\nTested-on: WCN3990 hw1.0 SNOC WLAN.HL.2.0-01387-QCAHLSWMTPLZ-1",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:perf-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.src",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:perf-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2521"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-50236"
		},
		{
			"cve":"CVE-2024-50299",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nsctp: properly validate chunk size in sctp_sf_ootb()\n\nA size validation fix similar to that in Commit 50619dbf8db7 (\"sctp: add\nsize validation when walking chunks\") is also required in sctp_sf_ootb()\nto address a crash reported by syzbot:\n\n  BUG: KMSAN: uninit-value in sctp_sf_ootb+0x7f5/0xce0 net/sctp/sm_statefuns.c:3712\n  sctp_sf_ootb+0x7f5/0xce0 net/sctp/sm_statefuns.c:3712\n  sctp_do_sm+0x181/0x93d0 net/sctp/sm_sideeffect.c:1166\n  sctp_endpoint_bh_rcv+0xc38/0xf90 net/sctp/endpointola.c:407\n  sctp_inq_push+0x2ef/0x380 net/sctp/inqueue.c:88\n  sctp_rcv+0x3831/0x3b20 net/sctp/input.c:243\n  sctp4_rcv+0x42/0x50 net/sctp/protocol.c:1159\n  ip_protocol_deliver_rcu+0xb51/0x13d0 net/ipv4/ip_input.c:205\n  ip_local_deliver_finish+0x336/0x500 net/ipv4/ip_input.c:233",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:perf-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.src",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:perf-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2521"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-50299"
		},
		{
			"cve":"CVE-2024-53059",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: iwlwifi: mvm: Fix response handling in iwl_mvm_send_recovery_cmd()\n\n1. The size of the response packet is not validated.\n2. The response buffer is not freed.\n\nResolve these issues by switching to iwl_mvm_send_cmd_status(),\nwhich handles both size validation and frees the buffer.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:perf-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.src",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:perf-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2521"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.8,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2024-53059"
		},
		{
			"cve":"CVE-2024-53063",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: dvbdev: prevent the risk of out of memory access\n\nThe dvbdev contains a static variable used to store dvb minors.\n\nThe behavior of it depends if CONFIG_DVB_DYNAMIC_MINORS is set\nor not. When not set, dvb_register_device() won't check for\nboundaries, as it will rely that a previous call to\ndvb_register_adapter() would already be enforcing it.\n\nOn a similar way, dvb_device_open() uses the assumption\nthat the register functions already did the needed checks.\n\nThis can be fragile if some device ends using different\ncalls. This also generate warnings on static check analysers\nlike Coverity.\n\nSo, add explicit guards to prevent potential risk of OOM issues.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:perf-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.src",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:perf-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2521"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-53063"
		},
		{
			"cve":"CVE-2024-53073",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nNFSD: Never decrement pending_async_copies on error\n\nThe error flow in nfsd4_copy() calls cleanup_async_copy(), which\nalready decrements nn->pending_async_copies.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:perf-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.src",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:perf-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2521"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-53073"
		},
		{
			"cve":"CVE-2024-53090",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nafs: Fix lock recursion\n\nafs_wake_up_async_call() can incur lock recursion.  The problem is that it\nis called from AF_RXRPC whilst holding the ->notify_lock, but it tries to\ntake a ref on the afs_call struct in order to pass it to a work queue - but\nif the afs_call is already queued, we then have an extraneous ref that must\nbe put... calling afs_put_call() may call back down into AF_RXRPC through\nrxrpc_kernel_shutdown_call(), however, which might try taking the\n->notify_lock again.\n\nThis case isn't very common, however, so defer it to a workqueue.  The oops\nlooks something like:\n\n  BUG: spinlock recursion on CPU#0, krxrpcio/7001/1646\n   lock: 0xffff888141399b30, .magic: dead4ead, .owner: krxrpcio/7001/1646, .owner_cpu: 0\n  CPU: 0 UID: 0 PID: 1646 Comm: krxrpcio/7001 Not tainted 6.12.0-rc2-build3+ #4351\n  Hardware name: ASUS All Series/H97-PLUS, BIOS 2306 10/09/2014\n  Call Trace:\n   <TASK>\n   dump_stack_lvl+0x47/0x70\n   do_raw_spin_lock+0x3c/0x90\n   rxrpc_kernel_shutdown_call+0x83/0xb0\n   afs_put_call+0xd7/0x180\n   rxrpc_notify_socket+0xa0/0x190\n   rxrpc_input_split_jumbo+0x198/0x1d0\n   rxrpc_input_data+0x14b/0x1e0\n   ? rxrpc_input_call_packet+0xc2/0x1f0\n   rxrpc_input_call_event+0xad/0x6b0\n   rxrpc_input_packet_on_conn+0x1e1/0x210\n   rxrpc_input_packet+0x3f2/0x4d0\n   rxrpc_io_thread+0x243/0x410\n   ? __pfx_rxrpc_io_thread+0x10/0x10\n   kthread+0xcf/0xe0\n   ? __pfx_kthread+0x10/0x10\n   ret_from_fork+0x24/0x40\n   ? __pfx_kthread+0x10/0x10\n   ret_from_fork_asm+0x1a/0x30\n   </TASK>",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:perf-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.src",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:perf-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2521"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-53090"
		},
		{
			"cve":"CVE-2024-53099",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Check validity of link->type in bpf_link_show_fdinfo()\n\nIf a newly-added link type doesn't invoke BPF_LINK_TYPE(), accessing\nbpf_link_type_strs[link->type] may result in an out-of-bounds access.\n\nTo spot such missed invocations early in the future, checking the\nvalidity of link->type in bpf_link_show_fdinfo() and emitting a warning\nwhen such invocations are missed.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:perf-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.src",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:perf-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2521"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":6.1,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-53099"
		},
		{
			"cve":"CVE-2024-53101",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nfs: Fix uninitialized value issue in from_kuid and from_kgid\n\nocfs2_setattr() uses attr->ia_mode, attr->ia_uid and attr->ia_gid in\na trace point even though ATTR_MODE, ATTR_UID and ATTR_GID aren't set.\n\nInitialize all fields of newattrs to avoid uninitialized variables, by\nchecking if ATTR_MODE, ATTR_UID, ATTR_GID are initialized, otherwise 0.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:perf-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.src",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:perf-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.104.0.185.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2521"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.104.0.185.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.104.0.185.oe2203sp1.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-53101"
		}
	]
}