{
	"document":{
		"aggregate_severity":{
			"namespace":"https://nvd.nist.gov/vuln-metrics/cvss",
			"text":"High"
		},
		"category":"csaf_vex",
		"csaf_version":"2.0",
		"distribution":{
			"tlp":{
				"label":"WHITE",
				"url":"https:/www.first.org/tlp/"
			}
		},
		"lang":"en",
		"notes":[
			{
				"text":"kernel security update",
				"category":"general",
				"title":"Synopsis"
			},
			{
				"text":"An update for kernel is now available for openEuler-24.03-LTS",
				"category":"general",
				"title":"Summary"
			},
			{
				"text":"The Linux Kernel, the operating system core itself.\n\nSecurity Fix(es):\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nKVM: SVM: WARN on vNMI + NMI window iff NMIs are outright masked\n\nWhen requesting an NMI window, WARN on vNMI support being enabled if and\nonly if NMIs are actually masked, i.e. if the vCPU is already handling an\nNMI.  KVM's ABI for NMIs that arrive simultanesouly (from KVM's point of\nview) is to inject one NMI and pend the other.  When using vNMI, KVM pends\nthe second NMI simply by setting V_NMI_PENDING, and lets the CPU do the\nrest (hardware automatically sets V_NMI_BLOCKING when an NMI is injected).\n\nHowever, if KVM can't immediately inject an NMI, e.g. because the vCPU is\nin an STI shadow or is running with GIF=0, then KVM will request an NMI\nwindow and trigger the WARN (but still function correctly).\n\nWhether or not the GIF=0 case makes sense is debatable, as the intent of\nKVM's behavior is to provide functionality that is as close to real\nhardware as possible.  E.g. if two NMIs are sent in quick succession, the\nprobability of both NMIs arriving in an STI shadow is infinitesimally low\non real hardware, but significantly larger in a virtual environment, e.g.\nif the vCPU is preempted in the STI shadow.  For GIF=0, the argument isn't\nas clear cut, because the window where two NMIs can collide is much larger\nin bare metal (though still small).\n\nThat said, KVM should not have divergent behavior for the GIF=0 case based\non whether or not vNMI support is enabled.  And KVM has allowed\nsimultaneous NMIs with GIF=0 for over a decade, since commit 7460fb4a3400\n(\"KVM: Fix simultaneous NMIs\").  I.e. KVM's GIF=0 handling shouldn't be\nmodified without a *really* good reason to do so, and if KVM's behavior\nwere to be modified, it should be done irrespective of vNMI support.(CVE-2024-39483)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nserial: sc16is7xx: fix invalid FIFO access with special register set\n\nWhen enabling access to the special register set, Receiver time-out and\nRHR interrupts can happen. In this case, the IRQ handler will try to read\nfrom the FIFO thru the RHR register at address 0x00, but address 0x00 is\nmapped to DLL register, resulting in erroneous FIFO reading.\n\nCall graph example:\n    sc16is7xx_startup(): entry\n    sc16is7xx_ms_proc(): entry\n    sc16is7xx_set_termios(): entry\n    sc16is7xx_set_baud(): DLH/DLL = $009C --> access special register set\n    sc16is7xx_port_irq() entry            --> IIR is 0x0C\n    sc16is7xx_handle_rx() entry\n    sc16is7xx_fifo_read(): --> unable to access FIFO (RHR) because it is\n                               mapped to DLL (LCR=LCR_CONF_MODE_A)\n    sc16is7xx_set_baud(): exit --> Restore access to general register set\n\nFix the problem by claiming the efr_lock mutex when accessing the Special\nregister set.(CVE-2024-44950)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\ns390/dasd: fix error recovery leading to data corruption on ESE devices\n\nExtent Space Efficient (ESE) or thin provisioned volumes need to be\nformatted on demand during usual IO processing.\n\nThe dasd_ese_needs_format function checks for error codes that signal\nthe non existence of a proper track format.\n\nThe check for incorrect length is to imprecise since other error cases\nleading to transport of insufficient data also have this flag set.\nThis might lead to data corruption in certain error cases for example\nduring a storage server warmstart.\n\nFix by removing the check for incorrect length and replacing by\nexplicitly checking for invalid track format in transport mode.\n\nAlso remove the check for file protected since this is not a valid\nESE handling case.(CVE-2024-45026)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Add missing NULL pointer check within dpcd_extend_address_range\n\n[Why & How]\nASSERT if return NULL from kcalloc.(CVE-2024-46808)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Check link_index before accessing dc->links[]\n\n[WHY & HOW]\ndc->links[] has max size of MAX_LINKS and NULL is return when trying to\naccess with out-of-bound index.\n\nThis fixes 3 OVERRUN and 1 RESOURCE_LEAK issues reported by Coverity.(CVE-2024-46813)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nwifi: iwlwifi: mvm: use IWL_FW_CHECK for link ID check\n\nThe lookup function iwl_mvm_rcu_fw_link_id_to_link_conf() is\nnormally called with input from the firmware, so it should use\nIWL_FW_CHECK() instead of WARN_ON().(CVE-2024-46825)\n\nIn the Linux kernel, the following vulnerability has been resolved:  scsi: sd: Fix off-by-one error in sd_read_block_characteristics()  Ff the device returns page 0xb1 with length 8 (happens with qemu v2.x, for example), sd_read_block_characteristics() may attempt an out-of-bounds memory access when accessing the zoned field at offset 8.(CVE-2024-47682)\n\nIn the Linux kernel, the following vulnerability has been resolved:  block, bfq: fix possible UAF for bfqq->bic with merge chain  1) initial state, three tasks:    Process 1       Process 2 Process 3    (BIC1)          (BIC2)   (BIC3)     |  Λ            |  Λ    |  Λ     |  |            |  |    |  |     V  |            V  |    V  |     bfqq1           bfqq2    bfqq3 process ref:    1      1      1  2) bfqq1 merged to bfqq2:    Process 1       Process 2 Process 3    (BIC1)          (BIC2)   (BIC3)     |               |    |  Λ     \\--------------\\|    |  |                     V    V  |     bfqq1--------->bfqq2    bfqq3 process ref:    0      2      1  3) bfqq2 merged to bfqq3:    Process 1       Process 2 Process 3    (BIC1)          (BIC2)   (BIC3)   here -> Λ                |    |     \\--------------\\ \\-------------\\|                     V    V     bfqq1--------->bfqq2---------->bfqq3 process ref:    0      1      3  In this case, IO from Process 1 will get bfqq2 from BIC1 first, and then get bfqq3 through merge chain, and finially handle IO by bfqq3. Howerver, current code will think bfqq2 is owned by BIC1, like initial state, and set bfqq2->bic to BIC1.  bfq_insert_request -> by Process 1  bfqq = bfq_init_rq(rq)   bfqq = bfq_get_bfqq_handle_split    bfqq = bic_to_bfqq    -> get bfqq2 from BIC1  bfqq->ref++  rq->elv.priv[0] = bic  rq->elv.priv[1] = bfqq  if (bfqq_process_refs(bfqq) == 1)   bfqq->bic = bic   -> record BIC1 to bfqq2    __bfq_insert_request    new_bfqq = bfq_setup_cooperator    -> get bfqq3 from bfqq2->new_bfqq    bfqq_request_freed(bfqq)    new_bfqq->ref++    rq->elv.priv[1] = new_bfqq    -> handle IO by bfqq3  Fix the problem by checking bfqq is from merge chain fist. And this might fix a following problem reported by our syzkaller(unreproducible):  ================================================================== BUG: KASAN: slab-use-after-free in bfq_do_early_stable_merge block/bfq-iosched.c:5692 [inline] BUG: KASAN: slab-use-after-free in bfq_do_or_sched_stable_merge block/bfq-iosched.c:5805 [inline] BUG: KASAN: slab-use-after-free in bfq_get_queue+0x25b0/0x2610 block/bfq-iosched.c:5889 Write of size 1 at addr ffff888123839eb8 by task kworker/0:1H/18595  CPU: 0 PID: 18595 Comm: kworker/0:1H Tainted: G             L     6.6.0-07439-gba2303cacfda #6 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 Workqueue: kblockd blk_mq_requeue_work Call Trace:  <TASK>  __dump_stack lib/dump_stack.c:88 [inline]  dump_stack_lvl+0x91/0xf0 lib/dump_stack.c:106  print_address_description mm/kasan/report.c:364 [inline]  print_report+0x10d/0x610 mm/kasan/report.c:475  kasan_report+0x8e/0xc0 mm/kasan/report.c:588  bfq_do_early_stable_merge block/bfq-iosched.c:5692 [inline]  bfq_do_or_sched_stable_merge block/bfq-iosched.c:5805 [inline]  bfq_get_queue+0x25b0/0x2610 block/bfq-iosched.c:5889  bfq_get_bfqq_handle_split+0x169/0x5d0 block/bfq-iosched.c:6757  bfq_init_rq block/bfq-iosched.c:6876 [inline]  bfq_insert_request block/bfq-iosched.c:6254 [inline]  bfq_insert_requests+0x1112/0x5cf0 block/bfq-iosched.c:6304  blk_mq_insert_request+0x290/0x8d0 block/blk-mq.c:2593  blk_mq_requeue_work+0x6bc/0xa70 block/blk-mq.c:1502  process_one_work kernel/workqueue.c:2627 [inline]  process_scheduled_works+0x432/0x13f0 kernel/workqueue.c:2700  worker_thread+0x6f2/0x1160 kernel/workqueue.c:2781  kthread+0x33c/0x440 kernel/kthread.c:388  ret_from_fork+0x4d/0x80 arch/x86/kernel/process.c:147  ret_from_fork_asm+0x1b/0x30 arch/x86/entry/entry_64.S:305  </TASK>  Allocated by task 20776:  kasan_save_stack+0x20/0x40 mm/kasan/common.c:45  kasan_set_track+0x25/0x30 mm/kasan/common.c:52  __kasan_slab_alloc+0x87/0x90 mm/kasan/common.c:328  kasan_slab_alloc include/linux/kasan.h:188 [inline]  slab_post_alloc_hook mm/slab.h:763 [inline]  slab_alloc_node mm/slub.c:3458 [inline]  kmem_cache_alloc_node+0x1a4/0x6f0 mm/slub.c:3503  ioc_create_icq block/blk-ioc.c:370 [inline] ---truncated---(CVE-2024-47706)\n\nIn the Linux kernel, the following vulnerability has been resolved:  wifi: mt76: mt7996: use hweight16 to get correct tx antenna  The chainmask is u16 so using hweight8 cannot get correct tx_ant. Without this patch, the tx_ant of band 2 would be -1 and lead to the following issue: BUG: KASAN: stack-out-of-bounds in mt7996_mcu_add_sta+0x12e0/0x16e0 [mt7996e](CVE-2024-47714)\n\nIn the Linux kernel, the following vulnerability has been resolved:  wifi: mt76: mt7915: fix oops on non-dbdc mt7986  mt7915_band_config() sets band_idx = 1 on the main phy for mt7986 with MT7975_ONE_ADIE or MT7976_ONE_ADIE.  Commit 0335c034e726 (\"wifi: mt76: fix race condition related to checking tx queue fill status\") introduced a dereference of the phys array indirectly indexed by band_idx via wcid->phy_idx in mt76_wcid_cleanup(). This caused the following Oops on affected mt7986 devices:   Unable to handle kernel read from unreadable memory at virtual address 0000000000000024  Mem abort info:    ESR = 0x0000000096000005    EC = 0x25: DABT (current EL), IL = 32 bits    SET = 0, FnV = 0    EA = 0, S1PTW = 0    FSC = 0x05: level 1 translation fault  Data abort info:    ISV = 0, ISS = 0x00000005    CM = 0, WnR = 0  user pgtable: 4k pages, 39-bit VAs, pgdp=0000000042545000  [0000000000000024] pgd=0000000000000000, p4d=0000000000000000, pud=0000000000000000  Internal error: Oops: 0000000096000005 [#1] SMP  Modules linked in: ... mt7915e mt76_connac_lib mt76 mac80211 cfg80211 ...  CPU: 2 PID: 1631 Comm: hostapd Not tainted 5.15.150 #0  Hardware name: ZyXEL EX5700 (Telenor) (DT)  pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)  pc : mt76_wcid_cleanup+0x84/0x22c [mt76]  lr : mt76_wcid_cleanup+0x64/0x22c [mt76]  sp : ffffffc00a803700  x29: ffffffc00a803700 x28: ffffff80008f7300 x27: ffffff80003f3c00  x26: ffffff80000a7880 x25: ffffffc008c26e00 x24: 0000000000000001  x23: ffffffc000a68114 x22: 0000000000000000 x21: ffffff8004172cc8  x20: ffffffc00a803748 x19: ffffff8004152020 x18: 0000000000000000  x17: 00000000000017c0 x16: ffffffc008ef5000 x15: 0000000000000be0  x14: ffffff8004172e28 x13: ffffff8004172e28 x12: 0000000000000000  x11: 0000000000000000 x10: ffffff8004172e30 x9 : ffffff8004172e28  x8 : 0000000000000000 x7 : ffffff8004156020 x6 : 0000000000000000  x5 : 0000000000000031 x4 : 0000000000000000 x3 : 0000000000000001  x2 : 0000000000000000 x1 : ffffff80008f7300 x0 : 0000000000000024  Call trace:   mt76_wcid_cleanup+0x84/0x22c [mt76]   __mt76_sta_remove+0x70/0xbc [mt76]   mt76_sta_state+0x8c/0x1a4 [mt76]   mt7915_eeprom_get_power_delta+0x11e4/0x23a0 [mt7915e]   drv_sta_state+0x144/0x274 [mac80211]   sta_info_move_state+0x1cc/0x2a4 [mac80211]   sta_set_sinfo+0xaf8/0xc24 [mac80211]   sta_info_destroy_addr_bss+0x4c/0x6c [mac80211]    ieee80211_color_change_finish+0x1c08/0x1e70 [mac80211]   cfg80211_check_station_change+0x1360/0x4710 [cfg80211]   genl_family_rcv_msg_doit+0xb4/0x110   genl_rcv_msg+0xd0/0x1bc   netlink_rcv_skb+0x58/0x120   genl_rcv+0x34/0x50   netlink_unicast+0x1f0/0x2ec   netlink_sendmsg+0x198/0x3d0   ____sys_sendmsg+0x1b0/0x210   ___sys_sendmsg+0x80/0xf0   __sys_sendmsg+0x44/0xa0   __arm64_sys_sendmsg+0x20/0x30   invoke_syscall.constprop.0+0x4c/0xe0   do_el0_svc+0x40/0xd0   el0_svc+0x14/0x4c   el0t_64_sync_handler+0x100/0x110   el0t_64_sync+0x15c/0x160  Code: d2800002 910092c0 52800023 f9800011 (885f7c01)  ---[ end trace 7e42dd9a39ed2281 ]---  Fix by using mt76_dev_phy() which will map band_idx to the correct phy for all hardware combinations.(CVE-2024-47715)\n\nIn the Linux kernel, the following vulnerability has been resolved:  wifi: rtw88: always wait for both firmware loading attempts  In 'rtw_wait_firmware_completion()', always wait for both (regular and wowlan) firmware loading attempts. Otherwise if 'rtw_usb_intf_init()' has failed in 'rtw_usb_probe()', 'rtw_usb_disconnect()' may issue 'ieee80211_free_hw()' when one of 'rtw_load_firmware_cb()' (usually the wowlan one) is still in progress, causing UAF detected by KASAN.(CVE-2024-47718)\n\nIn the Linux kernel, the following vulnerability has been resolved:  bonding: Fix unnecessary warnings and logs from bond_xdp_get_xmit_slave()  syzbot reported a WARNING in bond_xdp_get_xmit_slave. To reproduce this[1], one bond device (bond1) has xdpdrv, which increases bpf_master_redirect_enabled_key. Another bond device (bond0) which is unsupported by XDP but its slave (veth3) has xdpgeneric that returns XDP_TX. This triggers WARN_ON_ONCE() from the xdp_master_redirect(). To reduce unnecessary warnings and improve log management, we need to delete the WARN_ON_ONCE() and add ratelimit to the netdev_err().  [1] Steps to reproduce:     # Needs tx_xdp with return XDP_TX;     ip l add veth0 type veth peer veth1     ip l add veth3 type veth peer veth4     ip l add bond0 type bond mode 6 # BOND_MODE_ALB, unsupported by XDP     ip l add bond1 type bond # BOND_MODE_ROUNDROBIN by default     ip l set veth0 master bond1     ip l set bond1 up     # Increases bpf_master_redirect_enabled_key     ip l set dev bond1 xdpdrv object tx_xdp.o section xdp_tx     ip l set veth3 master bond0     ip l set bond0 up     ip l set veth4 up     # Triggers WARN_ON_ONCE() from the xdp_master_redirect()     ip l set veth3 xdpgeneric object tx_xdp.o section xdp_tx(CVE-2024-47734)\n\nIn the Linux kernel, the following vulnerability has been resolved:  f2fs: Require FMODE_WRITE for atomic write ioctls  The F2FS ioctls for starting and committing atomic writes check for inode_owner_or_capable(), but this does not give LSMs like SELinux or Landlock an opportunity to deny the write access - if the caller's FSUID matches the inode's UID, inode_owner_or_capable() immediately returns true.  There are scenarios where LSMs want to deny a process the ability to write particular files, even files that the FSUID of the process owns; but this can currently partially be bypassed using atomic write ioctls in two ways:   - F2FS_IOC_START_ATOMIC_REPLACE + F2FS_IOC_COMMIT_ATOMIC_WRITE can    truncate an inode to size 0  - F2FS_IOC_START_ATOMIC_WRITE + F2FS_IOC_ABORT_ATOMIC_WRITE can revert    changes another process concurrently made to a file  Fix it by requiring FMODE_WRITE for these operations, just like for F2FS_IOC_MOVE_RANGE. Since any legitimate caller should only be using these ioctls when intending to write into the file, that seems unlikely to break anything.(CVE-2024-47740)\n\nIn the Linux kernel, the following vulnerability has been resolved:  RDMA/hns: Fix Use-After-Free of rsv_qp on HIP08  Currently rsv_qp is freed before ib_unregister_device() is called on HIP08. During the time interval, users can still dereg MR and rsv_qp will be used in this process, leading to a UAF. Move the release of rsv_qp after calling ib_unregister_device() to fix it.(CVE-2024-47750)\n\nIn the Linux kernel, the following vulnerability has been resolved:  media: mediatek: vcodec: Fix H264 multi stateless decoder smatch warning  Fix a smatch static checker warning on vdec_h264_req_multi_if.c. Which leads to a kernel crash when fb is NULL.(CVE-2024-47754)\n\nIn the Linux kernel, the following vulnerability has been resolved:  tpm: Clean up TPM space after command failure  tpm_dev_transmit prepares the TPM space before attempting command transmission. However if the command fails no rollback of this preparation is done. This can result in transient handles being leaked if the device is subsequently closed with no further commands performed.  Fix this by flushing the space in the event of command transmission failure.(CVE-2024-49851)\n\nIn the Linux kernel, the following vulnerability has been resolved:  bpf: Fix helper writes to read-only maps  Lonial found an issue that despite user- and BPF-side frozen BPF map (like in case of .rodata), it was still possible to write into it from a BPF program side through specific helpers having ARG_PTR_TO_{LONG,INT} as arguments.  In check_func_arg() when the argument is as mentioned, the meta->raw_mode is never set. Later, check_helper_mem_access(), under the case of PTR_TO_MAP_VALUE as register base type, it assumes BPF_READ for the subsequent call to check_map_access_type() and given the BPF map is read-only it succeeds.  The helpers really need to be annotated as ARG_PTR_TO_{LONG,INT} | MEM_UNINIT when results are written into them as opposed to read out of them. The latter indicates that it's okay to pass a pointer to uninitialized memory as the memory is written to anyway.  However, ARG_PTR_TO_{LONG,INT} is a special case of ARG_PTR_TO_FIXED_SIZE_MEM just with additional alignment requirement. So it is better to just get rid of the ARG_PTR_TO_{LONG,INT} special cases altogether and reuse the fixed size memory types. For this, add MEM_ALIGNED to additionally ensure alignment given these helpers write directly into the args via *<ptr> = val. The .arg*_size has been initialized reflecting the actual sizeof(*<ptr>).  MEM_ALIGNED can only be used in combination with MEM_FIXED_SIZE annotated argument types, since in !MEM_FIXED_SIZE cases the verifier does not know the buffer size a priori and therefore cannot blindly write *<ptr> = val.(CVE-2024-49861)\n\nIn the Linux kernel, the following vulnerability has been resolved:  drm/amd/pm: ensure the fw_info is not null before using it  This resolves the dereference null return value warning reported by Coverity.(CVE-2024-49890)\n\nIn the Linux kernel, the following vulnerability has been resolved:  scsi: lpfc: Validate hdwq pointers before dereferencing in reset/errata paths  When the HBA is undergoing a reset or is handling an errata event, NULL ptr dereference crashes may occur in routines such as lpfc_sli_flush_io_rings(), lpfc_dev_loss_tmo_callbk(), or lpfc_abort_handler().  Add NULL ptr checks before dereferencing hdwq pointers that may have been freed due to operations colliding with a reset or errata event handler.(CVE-2024-49891)\n\nIn the Linux kernel, the following vulnerability has been resolved:  drm/amd/display: Check null pointers before using dc->clk_mgr  [WHY & HOW] dc->clk_mgr is null checked previously in the same function, indicating it might be null.  Passing \"dc\" to \"dc->hwss.apply_idle_power_optimizations\", which dereferences null \"dc->clk_mgr\". (The function pointer resolves to \"dcn35_apply_idle_power_optimizations\".)  This fixes 1 FORWARD_NULL issue reported by Coverity.(CVE-2024-49907)\n\nIn the Linux kernel, the following vulnerability has been resolved:  wifi: iwlwifi: mvm: avoid NULL pointer dereference  iwl_mvm_tx_skb_sta() and iwl_mvm_tx_mpdu() verify that the mvmvsta pointer is not NULL. It retrieves this pointer using iwl_mvm_sta_from_mac80211, which is dereferencing the ieee80211_sta pointer. If sta is NULL, iwl_mvm_sta_from_mac80211 will dereference a NULL pointer. Fix this by checking the sta pointer before retrieving the mvmsta from it. If sta is not NULL, then mvmsta isn't either.(CVE-2024-49929)\n\nIn the Linux kernel, the following vulnerability has been resolved:  aoe: fix the potential use-after-free problem in more places  For fixing CVE-2023-6270, f98364e92662 (\"aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts\") makes tx() calling dev_put() instead of doing in aoecmd_cfg_pkts(). It avoids that the tx() runs into use-after-free.  Then Nicolai Stange found more places in aoe have potential use-after-free problem with tx(). e.g. revalidate(), aoecmd_ata_rw(), resend(), probe() and aoecmd_cfg_rsp(). Those functions also use aoenet_xmit() to push packet to tx queue. So they should also use dev_hold() to increase the refcnt of skb->dev.  On the other hand, moving dev_put() to tx() causes that the refcnt of skb->dev be reduced to a negative value, because corresponding dev_hold() are not called in revalidate(), aoecmd_ata_rw(), resend(), probe(), and aoecmd_cfg_rsp(). This patch fixed this issue.(CVE-2024-49982)\n\nIn the Linux kernel, the following vulnerability has been resolved:  net/mlx5: Fix error path in multi-packet WQE transmit  Remove the erroneous unmap in case no DMA mapping was established  The multi-packet WQE transmit code attempts to obtain a DMA mapping for the skb. This could fail, e.g. under memory pressure, when the IOMMU driver just can't allocate more memory for page tables. While the code tries to handle this in the path below the err_unmap label it erroneously unmaps one entry from the sq's FIFO list of active mappings. Since the current map attempt failed this unmap is removing some random DMA mapping that might still be required. If the PCI function now presents that IOVA, the IOMMU may assumes a rogue DMA access and e.g. on s390 puts the PCI function in error state.  The erroneous behavior was seen in a stress-test environment that created memory pressure.(CVE-2024-50001)\n\nIn the Linux kernel, the following vulnerability has been resolved:  exec: don't WARN for racy path_noexec check  Both i_mode and noexec checks wrapped in WARN_ON stem from an artifact of the previous implementation. They used to legitimately check for the condition, but that got moved up in two commits: 633fb6ac3980 (\"exec: move S_ISREG() check earlier\") 0fd338b2d2cd (\"exec: move path_noexec() check earlier\")  Instead of being removed said checks are WARN_ON'ed instead, which has some debug value.  However, the spurious path_noexec check is racy, resulting in unwarranted warnings should someone race with setting the noexec flag.  One can note there is more to perm-checking whether execve is allowed and none of the conditions are guaranteed to still hold after they were tested for.  Additionally this does not validate whether the code path did any perm checking to begin with -- it will pass if the inode happens to be regular.  Keep the redundant path_noexec() check even though it's mindless nonsense checking for guarantee that isn't given so drop the WARN.  Reword the commentary and do small tidy ups while here.  [brauner: keep redundant path_noexec() check](CVE-2024-50010)\n\nIn the Linux kernel, the following vulnerability has been resolved:  net: phy: Remove LED entry from LEDs list on unregister  Commit c938ab4da0eb (\"net: phy: Manual remove LEDs to ensure correct ordering\") correctly fixed a problem with using devm_ but missed removing the LED entry from the LEDs list.  This cause kernel panic on specific scenario where the port for the PHY is torn down and up and the kmod for the PHY is removed.  On setting the port down the first time, the assosiacted LEDs are correctly unregistered. The associated kmod for the PHY is now removed. The kmod is now added again and the port is now put up, the associated LED are registered again. On putting the port down again for the second time after these step, the LED list now have 4 elements. With the first 2 already unregistered previously and the 2 new one registered again.  This cause a kernel panic as the first 2 element should have been removed.  Fix this by correctly removing the element when LED is unregistered.(CVE-2024-50023)\n\nIn the Linux kernel, the following vulnerability has been resolved:  Bluetooth: RFCOMM: FIX possible deadlock in rfcomm_sk_state_change  rfcomm_sk_state_change attempts to use sock_lock so it must never be called with it locked but rfcomm_sock_ioctl always attempt to lock it causing the following trace:  ====================================================== WARNING: possible circular locking dependency detected 6.8.0-syzkaller-08951-gfe46a7dd189e #0 Not tainted ------------------------------------------------------ syz-executor386/5093 is trying to acquire lock: ffff88807c396258 (sk_lock-AF_BLUETOOTH-BTPROTO_RFCOMM){+.+.}-{0:0}, at: lock_sock include/net/sock.h:1671 [inline] ffff88807c396258 (sk_lock-AF_BLUETOOTH-BTPROTO_RFCOMM){+.+.}-{0:0}, at: rfcomm_sk_state_change+0x5b/0x310 net/bluetooth/rfcomm/sock.c:73  but task is already holding lock: ffff88807badfd28 (&d->lock){+.+.}-{3:3}, at: __rfcomm_dlc_close+0x226/0x6a0 net/bluetooth/rfcomm/core.c:491(CVE-2024-50044)\n\nIn the Linux kernel, the following vulnerability has been resolved:  fbcon: Fix a NULL pointer dereference issue in fbcon_putcs  syzbot has found a NULL pointer dereference bug in fbcon. Here is the simplified C reproducer:  struct param {  uint8_t type;  struct tiocl_selection ts; };  int main() {  struct fb_con2fbmap con2fb;  struct param param;   int fd = open(\"/dev/fb1\", 0, 0);   con2fb.console = 0x19;  con2fb.framebuffer = 0;  ioctl(fd, FBIOPUT_CON2FBMAP, &con2fb);   param.type = 2;  param.ts.xs = 0; param.ts.ys = 0;  param.ts.xe = 0; param.ts.ye = 0;  param.ts.sel_mode = 0;   int fd1 = open(\"/dev/tty1\", O_RDWR, 0);  ioctl(fd1, TIOCLINUX, &param);   con2fb.console = 1;  con2fb.framebuffer = 0;  ioctl(fd, FBIOPUT_CON2FBMAP, &con2fb);   return 0; }  After calling ioctl(fd1, TIOCLINUX, &param), the subsequent ioctl(fd, FBIOPUT_CON2FBMAP, &con2fb) causes the kernel to follow a different execution path:   set_con2fb_map   -> con2fb_init_display    -> fbcon_set_disp     -> redraw_screen      -> hide_cursor       -> clear_selection        -> highlight         -> invert_screen          -> do_update_region           -> fbcon_putcs            -> ops->putcs  Since ops->putcs is a NULL pointer, this leads to a kernel panic. To prevent this, we need to call set_blitting_type() within set_con2fb_map() to properly initialize ops->putcs.(CVE-2024-50048)\n\nIn the Linux kernel, the following vulnerability has been resolved:  Bluetooth: Call iso_exit() on module unload  If iso_init() has been called, iso_exit() must be called on module unload. Without that, the struct proto that iso_init() registered with proto_register() becomes invalid, which could cause unpredictable problems later. In my case, with CONFIG_LIST_HARDENED and CONFIG_BUG_ON_DATA_CORRUPTION enabled, loading the module again usually triggers this BUG():    list_add corruption. next->prev should be prev (ffffffffb5355fd0),     but was 0000000000000068. (next=ffffffffc0a010d0).   ------------[ cut here ]------------   kernel BUG at lib/list_debug.c:29!   Oops: invalid opcode: 0000 [#1] PREEMPT SMP PTI   CPU: 1 PID: 4159 Comm: modprobe Not tainted 6.10.11-4+bt2-ao-desktop #1   RIP: 0010:__list_add_valid_or_report+0x61/0xa0   ...     __list_add_valid_or_report+0x61/0xa0     proto_register+0x299/0x320     hci_sock_init+0x16/0xc0 [bluetooth]     bt_init+0x68/0xd0 [bluetooth]     __pfx_bt_init+0x10/0x10 [bluetooth]     do_one_initcall+0x80/0x2f0     do_init_module+0x8b/0x230     __do_sys_init_module+0x15f/0x190     do_syscall_64+0x68/0x110   ...(CVE-2024-50078)\n\nIn the Linux kernel, the following vulnerability has been resolved:  ksmbd: fix user-after-free from session log off  There is racy issue between smb2 session log off and smb2 session setup. It will cause user-after-free from session log off. This add session_lock when setting SMB2_SESSION_EXPIRED and referece count to session struct not to free session while it is being used.(CVE-2024-50086)\n\nIn the Linux kernel, the following vulnerability has been resolved:  iommu/vt-d: Fix incorrect pci_for_each_dma_alias() for non-PCI devices  Previously, the domain_context_clear() function incorrectly called pci_for_each_dma_alias() to set up context entries for non-PCI devices. This could lead to kernel hangs or other unexpected behavior.  Add a check to only call pci_for_each_dma_alias() for PCI devices. For non-PCI devices, domain_context_clear_one() is called directly.(CVE-2024-50101)\n\nIn the Linux kernel, the following vulnerability has been resolved:  drm/amd/display: Disable PSR-SU on Parade 08-01 TCON too  Stuart Hayhurst has found that both at bootup and fullscreen VA-API video is leading to black screens for around 1 second and kernel WARNING [1] traces when calling dmub_psr_enable() with Parade 08-01 TCON.  These symptoms all go away with PSR-SU disabled for this TCON, so disable it for now while DMUB traces [2] from the failure can be analyzed and the failure state properly root caused.  (cherry picked from commit afb634a6823d8d9db23c5fb04f79c5549349628b)(CVE-2024-50108)\n\nIn the Linux kernel, the following vulnerability has been resolved:  net: sched: use RCU read-side critical section in taprio_dump()  Fix possible use-after-free in 'taprio_dump()' by adding RCU read-side critical section there. Never seen on x86 but found on a KASAN-enabled arm64 system when investigating https://syzkaller.appspot.com/bug?extid=b65e0af58423fc8a73aa:  [T15862] BUG: KASAN: slab-use-after-free in taprio_dump+0xa0c/0xbb0 [T15862] Read of size 4 at addr ffff0000d4bb88f8 by task repro/15862 [T15862] [T15862] CPU: 0 UID: 0 PID: 15862 Comm: repro Not tainted 6.11.0-rc1-00293-gdefaf1a2113a-dirty #2 [T15862] Hardware name: QEMU QEMU Virtual Machine, BIOS edk2-20240524-5.fc40 05/24/2024 [T15862] Call trace: [T15862]  dump_backtrace+0x20c/0x220 [T15862]  show_stack+0x2c/0x40 [T15862]  dump_stack_lvl+0xf8/0x174 [T15862]  print_report+0x170/0x4d8 [T15862]  kasan_report+0xb8/0x1d4 [T15862]  __asan_report_load4_noabort+0x20/0x2c [T15862]  taprio_dump+0xa0c/0xbb0 [T15862]  tc_fill_qdisc+0x540/0x1020 [T15862]  qdisc_notify.isra.0+0x330/0x3a0 [T15862]  tc_modify_qdisc+0x7b8/0x1838 [T15862]  rtnetlink_rcv_msg+0x3c8/0xc20 [T15862]  netlink_rcv_skb+0x1f8/0x3d4 [T15862]  rtnetlink_rcv+0x28/0x40 [T15862]  netlink_unicast+0x51c/0x790 [T15862]  netlink_sendmsg+0x79c/0xc20 [T15862]  __sock_sendmsg+0xe0/0x1a0 [T15862]  ____sys_sendmsg+0x6c0/0x840 [T15862]  ___sys_sendmsg+0x1ac/0x1f0 [T15862]  __sys_sendmsg+0x110/0x1d0 [T15862]  __arm64_sys_sendmsg+0x74/0xb0 [T15862]  invoke_syscall+0x88/0x2e0 [T15862]  el0_svc_common.constprop.0+0xe4/0x2a0 [T15862]  do_el0_svc+0x44/0x60 [T15862]  el0_svc+0x50/0x184 [T15862]  el0t_64_sync_handler+0x120/0x12c [T15862]  el0t_64_sync+0x190/0x194 [T15862] [T15862] Allocated by task 15857: [T15862]  kasan_save_stack+0x3c/0x70 [T15862]  kasan_save_track+0x20/0x3c [T15862]  kasan_save_alloc_info+0x40/0x60 [T15862]  __kasan_kmalloc+0xd4/0xe0 [T15862]  __kmalloc_cache_noprof+0x194/0x334 [T15862]  taprio_change+0x45c/0x2fe0 [T15862]  tc_modify_qdisc+0x6a8/0x1838 [T15862]  rtnetlink_rcv_msg+0x3c8/0xc20 [T15862]  netlink_rcv_skb+0x1f8/0x3d4 [T15862]  rtnetlink_rcv+0x28/0x40 [T15862]  netlink_unicast+0x51c/0x790 [T15862]  netlink_sendmsg+0x79c/0xc20 [T15862]  __sock_sendmsg+0xe0/0x1a0 [T15862]  ____sys_sendmsg+0x6c0/0x840 [T15862]  ___sys_sendmsg+0x1ac/0x1f0 [T15862]  __sys_sendmsg+0x110/0x1d0 [T15862]  __arm64_sys_sendmsg+0x74/0xb0 [T15862]  invoke_syscall+0x88/0x2e0 [T15862]  el0_svc_common.constprop.0+0xe4/0x2a0 [T15862]  do_el0_svc+0x44/0x60 [T15862]  el0_svc+0x50/0x184 [T15862]  el0t_64_sync_handler+0x120/0x12c [T15862]  el0t_64_sync+0x190/0x194 [T15862] [T15862] Freed by task 6192: [T15862]  kasan_save_stack+0x3c/0x70 [T15862]  kasan_save_track+0x20/0x3c [T15862]  kasan_save_free_info+0x4c/0x80 [T15862]  poison_slab_object+0x110/0x160 [T15862]  __kasan_slab_free+0x3c/0x74 [T15862]  kfree+0x134/0x3c0 [T15862]  taprio_free_sched_cb+0x18c/0x220 [T15862]  rcu_core+0x920/0x1b7c [T15862]  rcu_core_si+0x10/0x1c [T15862]  handle_softirqs+0x2e8/0xd64 [T15862]  __do_softirq+0x14/0x20(CVE-2024-50126)\n\nIn the Linux kernel, the following vulnerability has been resolved:  net: sched: fix use-after-free in taprio_change()  In 'taprio_change()', 'admin' pointer may become dangling due to sched switch / removal caused by 'advance_sched()', and critical section protected by 'q->current_entry_lock' is too small to prevent from such a scenario (which causes use-after-free detected by KASAN). Fix this by prefer 'rcu_replace_pointer()' over 'rcu_assign_pointer()' to update 'admin' immediately before an attempt to schedule freeing.(CVE-2024-50127)\n\nIn the Linux kernel, the following vulnerability has been resolved:  net: wwan: fix global oob in wwan_rtnl_policy  The variable wwan_rtnl_link_ops assign a *bigger* maxtype which leads to a global out-of-bounds read when parsing the netlink attributes. Exactly same bug cause as the oob fixed in commit b33fb5b801c6 (\"net: qualcomm: rmnet: fix global oob in rmnet_policy\").  ================================================================== BUG: KASAN: global-out-of-bounds in validate_nla lib/nlattr.c:388 [inline] BUG: KASAN: global-out-of-bounds in __nla_validate_parse+0x19d7/0x29a0 lib/nlattr.c:603 Read of size 1 at addr ffffffff8b09cb60 by task syz.1.66276/323862  CPU: 0 PID: 323862 Comm: syz.1.66276 Not tainted 6.1.70 #1 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.13.0-1ubuntu1.1 04/01/2014 Call Trace:  <TASK>  __dump_stack lib/dump_stack.c:88 [inline]  dump_stack_lvl+0x177/0x231 lib/dump_stack.c:106  print_address_description mm/kasan/report.c:284 [inline]  print_report+0x14f/0x750 mm/kasan/report.c:395  kasan_report+0x139/0x170 mm/kasan/report.c:495  validate_nla lib/nlattr.c:388 [inline]  __nla_validate_parse+0x19d7/0x29a0 lib/nlattr.c:603  __nla_parse+0x3c/0x50 lib/nlattr.c:700  nla_parse_nested_deprecated include/net/netlink.h:1269 [inline]  __rtnl_newlink net/core/rtnetlink.c:3514 [inline]  rtnl_newlink+0x7bc/0x1fd0 net/core/rtnetlink.c:3623  rtnetlink_rcv_msg+0x794/0xef0 net/core/rtnetlink.c:6122  netlink_rcv_skb+0x1de/0x420 net/netlink/af_netlink.c:2508  netlink_unicast_kernel net/netlink/af_netlink.c:1326 [inline]  netlink_unicast+0x74b/0x8c0 net/netlink/af_netlink.c:1352  netlink_sendmsg+0x882/0xb90 net/netlink/af_netlink.c:1874  sock_sendmsg_nosec net/socket.c:716 [inline]  __sock_sendmsg net/socket.c:728 [inline]  ____sys_sendmsg+0x5cc/0x8f0 net/socket.c:2499  ___sys_sendmsg+0x21c/0x290 net/socket.c:2553  __sys_sendmsg net/socket.c:2582 [inline]  __do_sys_sendmsg net/socket.c:2591 [inline]  __se_sys_sendmsg+0x19e/0x270 net/socket.c:2589  do_syscall_x64 arch/x86/entry/common.c:51 [inline]  do_syscall_64+0x45/0x90 arch/x86/entry/common.c:81  entry_SYSCALL_64_after_hwframe+0x63/0xcd RIP: 0033:0x7f67b19a24ad RSP: 002b:00007f67b17febb8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e RAX: ffffffffffffffda RBX: 00007f67b1b45f80 RCX: 00007f67b19a24ad RDX: 0000000000000000 RSI: 0000000020005e40 RDI: 0000000000000004 RBP: 00007f67b1a1e01d R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007ffd2513764f R14: 00007ffd251376e0 R15: 00007f67b17fed40  </TASK>  The buggy address belongs to the variable:  wwan_rtnl_policy+0x20/0x40  The buggy address belongs to the physical page: page:ffffea00002c2700 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xb09c flags: 0xfff00000001000(reserved|node=0|zone=1|lastcpupid=0x7ff) raw: 00fff00000001000 ffffea00002c2708 ffffea00002c2708 0000000000000000 raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 page dumped because: kasan: bad access detected page_owner info is not present (never set?)  Memory state around the buggy address:  ffffffff8b09ca00: 05 f9 f9 f9 05 f9 f9 f9 00 01 f9 f9 00 01 f9 f9  ffffffff8b09ca80: 00 00 00 05 f9 f9 f9 f9 00 00 03 f9 f9 f9 f9 f9 >ffffffff8b09cb00: 00 00 00 00 05 f9 f9 f9 00 00 00 00 f9 f9 f9 f9                                                        ^  ffffffff8b09cb80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ==================================================================  According to the comment of `nla_parse_nested_deprecated`, use correct size `IFLA_WWAN_MAX` here to fix this issue.(CVE-2024-50128)\n\nIn the Linux kernel, the following vulnerability has been resolved:  netfilter: bpf: must hold reference on net namespace  BUG: KASAN: slab-use-after-free in __nf_unregister_net_hook+0x640/0x6b0 Read of size 8 at addr ffff8880106fe400 by task repro/72= bpf_nf_link_release+0xda/0x1e0 bpf_link_free+0x139/0x2d0 bpf_link_release+0x68/0x80 __fput+0x414/0xb60  Eric says:  It seems that bpf was able to defer the __nf_unregister_net_hook()  after exit()/close() time.  Perhaps a netns reference is missing, because the netns has been  dismantled/freed already.  bpf_nf_link_attach() does :  link->net = net;  But I do not see a reference being taken on net.  Add such a reference and release it after hook unreg. Note that I was unable to get syzbot reproducer to work, so I do not know if this resolves this splat.(CVE-2024-50130)\n\nIn the Linux kernel, the following vulnerability has been resolved:  nvme-pci: fix race condition between reset and nvme_dev_disable()  nvme_dev_disable() modifies the dev->online_queues field, therefore nvme_pci_update_nr_queues() should avoid racing against it, otherwise we could end up passing invalid values to blk_mq_update_nr_hw_queues().   WARNING: CPU: 39 PID: 61303 at drivers/pci/msi/api.c:347           pci_irq_get_affinity+0x187/0x210  Workqueue: nvme-reset-wq nvme_reset_work [nvme]  RIP: 0010:pci_irq_get_affinity+0x187/0x210  Call Trace:   <TASK>   ? blk_mq_pci_map_queues+0x87/0x3c0   ? pci_irq_get_affinity+0x187/0x210   blk_mq_pci_map_queues+0x87/0x3c0   nvme_pci_map_queues+0x189/0x460 [nvme]   blk_mq_update_nr_hw_queues+0x2a/0x40   nvme_reset_work+0x1be/0x2a0 [nvme]  Fix the bug by locking the shutdown_lock mutex before using dev->online_queues. Give up if nvme_dev_disable() is running or if it has been executed already.(CVE-2024-50135)\n\nIn the Linux kernel, the following vulnerability has been resolved:  reset: starfive: jh71x0: Fix accessing the empty member on JH7110 SoC  data->asserted will be NULL on JH7110 SoC since commit 82327b127d41 (\"reset: starfive: Add StarFive JH7110 reset driver\") was added. Add the judgment condition to avoid errors when calling reset_control_status on JH7110 SoC.(CVE-2024-50137)\n\nIn the Linux kernel, the following vulnerability has been resolved:  KVM: arm64: Fix shift-out-of-bounds bug  Fix a shift-out-of-bounds bug reported by UBSAN when running VM with MTE enabled host kernel.  UBSAN: shift-out-of-bounds in arch/arm64/kvm/sys_regs.c:1988:14 shift exponent 33 is too large for 32-bit type 'int' CPU: 26 UID: 0 PID: 7629 Comm: qemu-kvm Not tainted 6.12.0-rc2 #34 Hardware name: IEI NF5280R7/Mitchell MB, BIOS 00.00. 2024-10-12 09:28:54 10/14/2024 Call trace:  dump_backtrace+0xa0/0x128  show_stack+0x20/0x38  dump_stack_lvl+0x74/0x90  dump_stack+0x18/0x28  __ubsan_handle_shift_out_of_bounds+0xf8/0x1e0  reset_clidr+0x10c/0x1c8  kvm_reset_sys_regs+0x50/0x1c8  kvm_reset_vcpu+0xec/0x2b0  __kvm_vcpu_set_target+0x84/0x158  kvm_vcpu_set_target+0x138/0x168  kvm_arch_vcpu_ioctl_vcpu_init+0x40/0x2b0  kvm_arch_vcpu_ioctl+0x28c/0x4b8  kvm_vcpu_ioctl+0x4bc/0x7a8  __arm64_sys_ioctl+0xb4/0x100  invoke_syscall+0x70/0x100  el0_svc_common.constprop.0+0x48/0xf0  do_el0_svc+0x24/0x38  el0_svc+0x3c/0x158  el0t_64_sync_handler+0x120/0x130  el0t_64_sync+0x194/0x198(CVE-2024-50139)\n\nIn the Linux kernel, the following vulnerability has been resolved:  usb: typec: altmode should keep reference to parent  The altmode device release refers to its parent device, but without keeping a reference to it.  When registering the altmode, get a reference to the parent and put it in the release function.  Before this fix, when using CONFIG_DEBUG_KOBJECT_RELEASE, we see issues like this:  [   43.572860] kobject: 'port0.0' (ffff8880057ba008): kobject_release, parent 0000000000000000 (delayed 3000) [   43.573532] kobject: 'port0.1' (ffff8880057bd008): kobject_release, parent 0000000000000000 (delayed 1000) [   43.574407] kobject: 'port0' (ffff8880057b9008): kobject_release, parent 0000000000000000 (delayed 3000) [   43.575059] kobject: 'port1.0' (ffff8880057ca008): kobject_release, parent 0000000000000000 (delayed 4000) [   43.575908] kobject: 'port1.1' (ffff8880057c9008): kobject_release, parent 0000000000000000 (delayed 4000) [   43.576908] kobject: 'typec' (ffff8880062dbc00): kobject_release, parent 0000000000000000 (delayed 4000) [   43.577769] kobject: 'port1' (ffff8880057bf008): kobject_release, parent 0000000000000000 (delayed 3000) [   46.612867] ================================================================== [   46.613402] BUG: KASAN: slab-use-after-free in typec_altmode_release+0x38/0x129 [   46.614003] Read of size 8 at addr ffff8880057b9118 by task kworker/2:1/48 [   46.614538] [   46.614668] CPU: 2 UID: 0 PID: 48 Comm: kworker/2:1 Not tainted 6.12.0-rc1-00138-gedbae730ad31 #535 [   46.615391] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.15.0-1 04/01/2014 [   46.616042] Workqueue: events kobject_delayed_cleanup [   46.616446] Call Trace: [   46.616648]  <TASK> [   46.616820]  dump_stack_lvl+0x5b/0x7c [   46.617112]  ? typec_altmode_release+0x38/0x129 [   46.617470]  print_report+0x14c/0x49e [   46.617769]  ? rcu_read_unlock_sched+0x56/0x69 [   46.618117]  ? __virt_addr_valid+0x19a/0x1ab [   46.618456]  ? kmem_cache_debug_flags+0xc/0x1d [   46.618807]  ? typec_altmode_release+0x38/0x129 [   46.619161]  kasan_report+0x8d/0xb4 [   46.619447]  ? typec_altmode_release+0x38/0x129 [   46.619809]  ? process_scheduled_works+0x3cb/0x85f [   46.620185]  typec_altmode_release+0x38/0x129 [   46.620537]  ? process_scheduled_works+0x3cb/0x85f [   46.620907]  device_release+0xaf/0xf2 [   46.621206]  kobject_delayed_cleanup+0x13b/0x17a [   46.621584]  process_scheduled_works+0x4f6/0x85f [   46.621955]  ? __pfx_process_scheduled_works+0x10/0x10 [   46.622353]  ? hlock_class+0x31/0x9a [   46.622647]  ? lock_acquired+0x361/0x3c3 [   46.622956]  ? move_linked_works+0x46/0x7d [   46.623277]  worker_thread+0x1ce/0x291 [   46.623582]  ? __kthread_parkme+0xc8/0xdf [   46.623900]  ? __pfx_worker_thread+0x10/0x10 [   46.624236]  kthread+0x17e/0x190 [   46.624501]  ? kthread+0xfb/0x190 [   46.624756]  ? __pfx_kthread+0x10/0x10 [   46.625015]  ret_from_fork+0x20/0x40 [   46.625268]  ? __pfx_kthread+0x10/0x10 [   46.625532]  ret_from_fork_asm+0x1a/0x30 [   46.625805]  </TASK> [   46.625953] [   46.626056] Allocated by task 678: [   46.626287]  kasan_save_stack+0x24/0x44 [   46.626555]  kasan_save_track+0x14/0x2d [   46.626811]  __kasan_kmalloc+0x3f/0x4d [   46.627049]  __kmalloc_noprof+0x1bf/0x1f0 [   46.627362]  typec_register_port+0x23/0x491 [   46.627698]  cros_typec_probe+0x634/0xbb6 [   46.628026]  platform_probe+0x47/0x8c [   46.628311]  really_probe+0x20a/0x47d [   46.628605]  device_driver_attach+0x39/0x72 [   46.628940]  bind_store+0x87/0xd7 [   46.629213]  kernfs_fop_write_iter+0x1aa/0x218 [   46.629574]  vfs_write+0x1d6/0x29b [   46.629856]  ksys_write+0xcd/0x13b [   46.630128]  do_syscall_64+0xd4/0x139 [   46.630420]  entry_SYSCALL_64_after_hwframe+0x76/0x7e [   46.630820] [   46.630946] Freed by task 48: [   46.631182]  kasan_save_stack+0x24/0x44 [   46.631493]  kasan_save_track+0x14/0x2d [   46.631799]  kasan_save_free_info+0x3f/0x4d [   46.632144]  __kasan_slab_free+0x37/0x45 [   46.632474] ---truncated---(CVE-2024-50150)\n\nIn the Linux kernel, the following vulnerability has been resolved:  netdevsim: use cond_resched() in nsim_dev_trap_report_work()  I am still seeing many syzbot reports hinting that syzbot might fool nsim_dev_trap_report_work() with hundreds of ports [1]  Lets use cond_resched(), and system_unbound_wq instead of implicit system_wq.  [1] INFO: task syz-executor:20633 blocked for more than 143 seconds.       Not tainted 6.12.0-rc2-syzkaller-00205-g1d227fcc7222 #0 \"echo 0 > /proc/sys/kernel/hung_task_timeout_secs\" disables this message. task:syz-executor    state:D stack:25856 pid:20633 tgid:20633 ppid:1      flags:0x00004006 ... NMI backtrace for cpu 1 CPU: 1 UID: 0 PID: 16760 Comm: kworker/1:0 Not tainted 6.12.0-rc2-syzkaller-00205-g1d227fcc7222 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 Workqueue: events nsim_dev_trap_report_work  RIP: 0010:__sanitizer_cov_trace_pc+0x0/0x70 kernel/kcov.c:210 Code: 89 fb e8 23 00 00 00 48 8b 3d 04 fb 9c 0c 48 89 de 5b e9 c3 c7 5d 00 0f 1f 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 <f3> 0f 1e fa 48 8b 04 24 65 48 8b 0c 25 c0 d7 03 00 65 8b 15 60 f0 RSP: 0018:ffffc90000a187e8 EFLAGS: 00000246 RAX: 0000000000000100 RBX: ffffc90000a188e0 RCX: ffff888027d3bc00 RDX: ffff888027d3bc00 RSI: 0000000000000000 RDI: 0000000000000000 RBP: ffff88804a2e6000 R08: ffffffff8a4bc495 R09: ffffffff89da3577 R10: 0000000000000004 R11: ffffffff8a4bc2b0 R12: dffffc0000000000 R13: ffff88806573b503 R14: dffffc0000000000 R15: ffff8880663cca00 FS:  0000000000000000(0000) GS:ffff8880b8700000(0000) knlGS:0000000000000000 CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007fc90a747f98 CR3: 000000000e734000 CR4: 00000000003526f0 DR0: 0000000000000000 DR1: 000000000000002b DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400 Call Trace:  <NMI>  </NMI>  <TASK>   __local_bh_enable_ip+0x1bb/0x200 kernel/softirq.c:382   spin_unlock_bh include/linux/spinlock.h:396 [inline]   nsim_dev_trap_report drivers/net/netdevsim/dev.c:820 [inline]   nsim_dev_trap_report_work+0x75d/0xaa0 drivers/net/netdevsim/dev.c:850   process_one_work kernel/workqueue.c:3229 [inline]   process_scheduled_works+0xa63/0x1850 kernel/workqueue.c:3310   worker_thread+0x870/0xd30 kernel/workqueue.c:3391   kthread+0x2f0/0x390 kernel/kthread.c:389   ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:147   ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244  </TASK>(CVE-2024-50155)\n\nIn the Linux kernel, the following vulnerability has been resolved:  RDMA/bnxt_re: Fix out of bound check  Driver exports pacing stats only on GenP5 and P7 adapters. But while parsing the pacing stats, driver has a check for \"rdev->dbr_pacing\".  This caused a trace when KASAN is enabled.  BUG: KASAN: slab-out-of-bounds in bnxt_re_get_hw_stats+0x2b6a/0x2e00 [bnxt_re] Write of size 8 at addr ffff8885942a6340 by task modprobe/4809(CVE-2024-50158)\n\nIn the Linux kernel, the following vulnerability has been resolved:  bpf: Make sure internal and UAPI bpf_redirect flags don't overlap  The bpf_redirect_info is shared between the SKB and XDP redirect paths, and the two paths use the same numeric flag values in the ri->flags field (specifically, BPF_F_BROADCAST == BPF_F_NEXTHOP). This means that if skb bpf_redirect_neigh() is used with a non-NULL params argument and, subsequently, an XDP redirect is performed using the same bpf_redirect_info struct, the XDP path will get confused and end up crashing, which syzbot managed to trigger.  With the stack-allocated bpf_redirect_info, the structure is no longer shared between the SKB and XDP paths, so the crash doesn't happen anymore. However, different code paths using identically-numbered flag values in the same struct field still seems like a bit of a mess, so this patch cleans that up by moving the flag definitions together and redefining the three flags in BPF_F_REDIRECT_INTERNAL to not overlap with the flags used for XDP. It also adds a BUILD_BUG_ON() check to make sure the overlap is not re-introduced by mistake.(CVE-2024-50163)\n\nIn the Linux kernel, the following vulnerability has been resolved:  bpf: Fix overloading of MEM_UNINIT's meaning  Lonial reported an issue in the BPF verifier where check_mem_size_reg() has the following code:      if (!tnum_is_const(reg->var_off))         /* For unprivileged variable accesses, disable raw          * mode so that the program is required to          * initialize all the memory that the helper could          * just partially fill up.          */          meta = NULL;  This means that writes are not checked when the register containing the size of the passed buffer has not a fixed size. Through this bug, a BPF program can write to a map which is marked as read-only, for example, .rodata global maps.  The problem is that MEM_UNINIT's initial meaning that \"the passed buffer to the BPF helper does not need to be initialized\" which was added back in commit 435faee1aae9 (\"bpf, verifier: add ARG_PTR_TO_RAW_STACK type\") got overloaded over time with \"the passed buffer is being written to\".  The problem however is that checks such as the above which were added later via 06c1c049721a (\"bpf: allow helpers access to variable memory\") set meta to NULL in order force the user to always initialize the passed buffer to the helper. Due to the current double meaning of MEM_UNINIT, this bypasses verifier write checks to the memory (not boundary checks though) and only assumes the latter memory is read instead.  Fix this by reverting MEM_UNINIT back to its original meaning, and having MEM_WRITE as an annotation to BPF helpers in order to then trigger the BPF verifier checks for writing to memory.  Some notes: check_arg_pair_ok() ensures that for ARG_CONST_SIZE{,_OR_ZERO} we can access fn->arg_type[arg - 1] since it must contain a preceding ARG_PTR_TO_MEM. For check_mem_reg() the meta argument can be removed altogether since we do check both BPF_READ and BPF_WRITE. Same for the equivalent check_kfunc_mem_size_reg().(CVE-2024-50164)\n\nIn the Linux kernel, the following vulnerability has been resolved:  drm/vc4: Stop the active perfmon before being destroyed  Upon closing the file descriptor, the active performance monitor is not stopped. Although all perfmons are destroyed in `vc4_perfmon_close_file()`, the active performance monitor's pointer (`vc4->active_perfmon`) is still retained.  If we open a new file descriptor and submit a few jobs with performance monitors, the driver will attempt to stop the active performance monitor using the stale pointer in `vc4->active_perfmon`. However, this pointer is no longer valid because the previous process has already terminated, and all performance monitors associated with it have been destroyed and freed.  To fix this, when the active performance monitor belongs to a given process, explicitly stop it before destroying and freeing it.(CVE-2024-50187)\n\nIn the Linux kernel, the following vulnerability has been resolved:  net: phy: dp83869: fix memory corruption when enabling fiber  When configuring the fiber port, the DP83869 PHY driver incorrectly calls linkmode_set_bit() with a bit mask (1 << 10) rather than a bit number (10). This corrupts some other memory location -- in case of arm64 the priv pointer in the same structure.  Since the advertising flags are updated from supported at the end of the function the incorrect line isn't needed at all and can be removed.(CVE-2024-50188)\n\nIn the Linux kernel, the following vulnerability has been resolved:  pinctrl: ocelot: fix system hang on level based interrupts  The current implementation only calls chained_irq_enter() and chained_irq_exit() if it detects pending interrupts.  ``` for (i = 0; i < info->stride; i++) {  uregmap_read(info->map, id_reg + 4 * i, &reg);  if (!reg)   continue;   chained_irq_enter(parent_chip, desc); ```  However, in case of GPIO pin configured in level mode and the parent controller configured in edge mode, GPIO interrupt might be lowered by the hardware. In the result, if the interrupt is short enough, the parent interrupt is still pending while the GPIO interrupt is cleared; chained_irq_enter() never gets called and the system hangs trying to service the parent interrupt.  Moving chained_irq_enter() and chained_irq_exit() outside the for loop ensures that they are called even when GPIO interrupt is lowered by the hardware.  The similar code with chained_irq_enter() / chained_irq_exit() functions wrapping interrupt checking loop may be found in many other drivers: ``` grep -r -A 10 chained_irq_enter drivers/pinctrl ```(CVE-2024-50196)\n\nIn the Linux kernel, the following vulnerability has been resolved:  drm/radeon: Fix encoder->possible_clones  Include the encoder itself in its possible_clones bitmask. In the past nothing validated that drivers were populating possible_clones correctly, but that changed in commit 74d2aacbe840 (\"drm: Validate encoder->possible_clones\"). Looks like radeon never got the memo and is still not following the rules 100% correctly.  This results in some warnings during driver initialization: Bogus possible_clones: [ENCODER:46:TV-46] possible_clones=0x4 (full encoder mask=0x7) WARNING: CPU: 0 PID: 170 at drivers/gpu/drm/drm_mode_config.c:615 drm_mode_config_validate+0x113/0x39c ...  (cherry picked from commit 3b6e7d40649c0d75572039aff9d0911864c689db)(CVE-2024-50201)\n\nIn the Linux kernel, the following vulnerability has been resolved:  udf: refactor inode_bmap() to handle error  Refactor inode_bmap() to handle error since udf_next_aext() can return error now. On situations like ftruncate, udf_extend_file() can now detect errors and bail out early without resorting to checking for particular offsets and assuming internal behavior of these functions.(CVE-2024-50211)\n\nIn the Linux kernel, the following vulnerability has been resolved:  ocfs2: pass u64 to ocfs2_truncate_inline maybe overflow  Syzbot reported a kernel BUG in ocfs2_truncate_inline.  There are two reasons for this: first, the parameter value passed is greater than ocfs2_max_inline_data_with_xattr, second, the start and end parameters of ocfs2_truncate_inline are \"unsigned int\".  So, we need to add a sanity check for byte_start and byte_len right before ocfs2_truncate_inline() in ocfs2_remove_inode_range(), if they are greater than ocfs2_max_inline_data_with_xattr return -EINVAL.(CVE-2024-50218)\n\nIn the Linux kernel, the following vulnerability has been resolved:  iov_iter: fix copy_page_from_iter_atomic() if KMAP_LOCAL_FORCE_MAP  generic/077 on x86_32 CONFIG_DEBUG_KMAP_LOCAL_FORCE_MAP=y with highmem, on huge=always tmpfs, issues a warning and then hangs (interruptibly):  WARNING: CPU: 5 PID: 3517 at mm/highmem.c:622 kunmap_local_indexed+0x62/0xc9 CPU: 5 UID: 0 PID: 3517 Comm: cp Not tainted 6.12.0-rc4 #2 ... copy_page_from_iter_atomic+0xa6/0x5ec generic_perform_write+0xf6/0x1b4 shmem_file_write_iter+0x54/0x67  Fix copy_page_from_iter_atomic() by limiting it in that case (include/linux/skbuff.h skb_frag_must_loop() does similar).  But going forward, perhaps CONFIG_DEBUG_KMAP_LOCAL_FORCE_MAP is too surprising, has outlived its usefulness, and should just be removed?(CVE-2024-50222)\n\nIn the Linux kernel, the following vulnerability has been resolved:  cxl/port: Fix use-after-free, permit out-of-order decoder shutdown  In support of investigating an initialization failure report [1], cxl_test was updated to register mock memory-devices after the mock root-port/bus device had been registered. That led to cxl_test crashing with a use-after-free bug with the following signature:      cxl_port_attach_region: cxl region3: cxl_host_bridge.0:port3 decoder3.0 add: mem0:decoder7.0 @ 0 next: cxl_switch_uport.0 nr_eps: 1 nr_targets: 1     cxl_port_attach_region: cxl region3: cxl_host_bridge.0:port3 decoder3.0 add: mem4:decoder14.0 @ 1 next: cxl_switch_uport.0 nr_eps: 2 nr_targets: 1     cxl_port_setup_targets: cxl region3: cxl_switch_uport.0:port6 target[0] = cxl_switch_dport.0 for mem0:decoder7.0 @ 0 1)  cxl_port_setup_targets: cxl region3: cxl_switch_uport.0:port6 target[1] = cxl_switch_dport.4 for mem4:decoder14.0 @ 1     [..]     cxld_unregister: cxl decoder14.0:     cxl_region_decode_reset: cxl_region region3:     mock_decoder_reset: cxl_port port3: decoder3.0 reset 2)  mock_decoder_reset: cxl_port port3: decoder3.0: out of order reset, expected decoder3.1     cxl_endpoint_decoder_release: cxl decoder14.0:     [..]     cxld_unregister: cxl decoder7.0: 3)  cxl_region_decode_reset: cxl_region region3:     Oops: general protection fault, probably for non-canonical address 0x6b6b6b6b6b6b6bc3: 0000 [#1] PREEMPT SMP PTI     [..]     RIP: 0010:to_cxl_port+0x8/0x60 [cxl_core]     [..]     Call Trace:      <TASK>      cxl_region_decode_reset+0x69/0x190 [cxl_core]      cxl_region_detach+0xe8/0x210 [cxl_core]      cxl_decoder_kill_region+0x27/0x40 [cxl_core]      cxld_unregister+0x5d/0x60 [cxl_core]  At 1) a region has been established with 2 endpoint decoders (7.0 and 14.0). Those endpoints share a common switch-decoder in the topology (3.0). At teardown, 2), decoder14.0 is the first to be removed and hits the \"out of order reset case\" in the switch decoder. The effect though is that region3 cleanup is aborted leaving it in-tact and referencing decoder14.0. At 3) the second attempt to teardown region3 trips over the stale decoder14.0 object which has long since been deleted.  The fix here is to recognize that the CXL specification places no mandate on in-order shutdown of switch-decoders, the driver enforces in-order allocation, and hardware enforces in-order commit. So, rather than fail and leave objects dangling, always remove them.  In support of making cxl_region_decode_reset() always succeed, cxl_region_invalidate_memregion() failures are turned into warnings. Crashing the kernel is ok there since system integrity is at risk if caches cannot be managed around physical address mutation events like CXL region destruction.  A new device_for_each_child_reverse_from() is added to cleanup port->commit_end after all dependent decoders have been disabled. In other words if decoders are allocated 0->1->2 and disabled 1->2->0 then port->commit_end only decrements from 2 after 2 has been disabled, and it decrements all the way to zero since 1 was disabled previously.(CVE-2024-50226)\n\nIn the Linux kernel, the following vulnerability has been resolved:  nilfs2: fix potential deadlock with newly created symlinks  Syzbot reported that page_symlink(), called by nilfs_symlink(), triggers memory reclamation involving the filesystem layer, which can result in circular lock dependencies among the reader/writer semaphore nilfs->ns_segctor_sem, s_writers percpu_rwsem (intwrite) and the fs_reclaim pseudo lock.  This is because after commit 21fc61c73c39 (\"don't put symlink bodies in pagecache into highmem\"), the gfp flags of the page cache for symbolic links are overwritten to GFP_KERNEL via inode_nohighmem().  This is not a problem for symlinks read from the backing device, because the __GFP_FS flag is dropped after inode_nohighmem() is called.  However, when a new symlink is created with nilfs_symlink(), the gfp flags remain overwritten to GFP_KERNEL.  Then, memory allocation called from page_symlink() etc.  triggers memory reclamation including the FS layer, which may call nilfs_evict_inode() or nilfs_dirty_inode().  And these can cause a deadlock if they are called while nilfs->ns_segctor_sem is held:  Fix this issue by dropping the __GFP_FS flag from the page cache GFP flags of newly created symlinks in the same way that nilfs_new_inode() and __nilfs_read_inode() do, as a workaround until we adopt nofs allocation scope consistently or improve the locking constraints.(CVE-2024-50229)\n\nIn the Linux kernel, the following vulnerability has been resolved:  wifi: cfg80211: clear wdev->cqm_config pointer on free  When we free wdev->cqm_config when unregistering, we also need to clear out the pointer since the same wdev/netdev may get re-registered in another network namespace, then destroyed later, running this code again, which results in a double-free.(CVE-2024-50235)\n\nIn the Linux kernel, the following vulnerability has been resolved:  netdevsim: Add trailing zero to terminate the string in nsim_nexthop_bucket_activity_write()  This was found by a static analyzer. We should not forget the trailing zero after copy_from_user() if we will further do some string operations, sscanf() in this case. Adding a trailing zero will ensure that the function performs properly.(CVE-2024-50259)\n\nIn the Linux kernel, the following vulnerability has been resolved:  macsec: Fix use-after-free while sending the offloading packet  KASAN reports the following UAF. The metadata_dst, which is used to store the SCI value for macsec offload, is already freed by metadata_dst_free() in macsec_free_netdev(), while driver still use it for sending the packet.  To fix this issue, dst_release() is used instead to release metadata_dst. So it is not freed instantly in macsec_free_netdev() if still referenced by skb.   BUG: KASAN: slab-use-after-free in mlx5e_xmit+0x1e8f/0x4190 [mlx5_core]  Read of size 2 at addr ffff88813e42e038 by task kworker/7:2/714  [...]  Workqueue: mld mld_ifc_work  Call Trace:   <TASK>   dump_stack_lvl+0x51/0x60   print_report+0xc1/0x600   kasan_report+0xab/0xe0   mlx5e_xmit+0x1e8f/0x4190 [mlx5_core]   dev_hard_start_xmit+0x120/0x530   sch_direct_xmit+0x149/0x11e0   __qdisc_run+0x3ad/0x1730   __dev_queue_xmit+0x1196/0x2ed0   vlan_dev_hard_start_xmit+0x32e/0x510 [8021q]   dev_hard_start_xmit+0x120/0x530   __dev_queue_xmit+0x14a7/0x2ed0   macsec_start_xmit+0x13e9/0x2340   dev_hard_start_xmit+0x120/0x530   __dev_queue_xmit+0x14a7/0x2ed0   ip6_finish_output2+0x923/0x1a70   ip6_finish_output+0x2d7/0x970   ip6_output+0x1ce/0x3a0   NF_HOOK.constprop.0+0x15f/0x190   mld_sendpack+0x59a/0xbd0   mld_ifc_work+0x48a/0xa80   process_one_work+0x5aa/0xe50   worker_thread+0x79c/0x1290   kthread+0x28f/0x350   ret_from_fork+0x2d/0x70   ret_from_fork_asm+0x11/0x20   </TASK>   Allocated by task 3922:   kasan_save_stack+0x20/0x40   kasan_save_track+0x10/0x30   __kasan_kmalloc+0x77/0x90   __kmalloc_noprof+0x188/0x400   metadata_dst_alloc+0x1f/0x4e0   macsec_newlink+0x914/0x1410   __rtnl_newlink+0xe08/0x15b0   rtnl_newlink+0x5f/0x90   rtnetlink_rcv_msg+0x667/0xa80   netlink_rcv_skb+0x12c/0x360   netlink_unicast+0x551/0x770   netlink_sendmsg+0x72d/0xbd0   __sock_sendmsg+0xc5/0x190   ____sys_sendmsg+0x52e/0x6a0   ___sys_sendmsg+0xeb/0x170   __sys_sendmsg+0xb5/0x140   do_syscall_64+0x4c/0x100   entry_SYSCALL_64_after_hwframe+0x4b/0x53   Freed by task 4011:   kasan_save_stack+0x20/0x40   kasan_save_track+0x10/0x30   kasan_save_free_info+0x37/0x50   poison_slab_object+0x10c/0x190   __kasan_slab_free+0x11/0x30   kfree+0xe0/0x290   macsec_free_netdev+0x3f/0x140   netdev_run_todo+0x450/0xc70   rtnetlink_rcv_msg+0x66f/0xa80   netlink_rcv_skb+0x12c/0x360   netlink_unicast+0x551/0x770   netlink_sendmsg+0x72d/0xbd0   __sock_sendmsg+0xc5/0x190   ____sys_sendmsg+0x52e/0x6a0   ___sys_sendmsg+0xeb/0x170   __sys_sendmsg+0xb5/0x140   do_syscall_64+0x4c/0x100   entry_SYSCALL_64_after_hwframe+0x4b/0x53(CVE-2024-50261)\n\nIn the Linux kernel, the following vulnerability has been resolved:  vsock/virtio: Initialization of the dangling pointer occurring in vsk->trans  During loopback communication, a dangling pointer can be created in vsk->trans, potentially leading to a Use-After-Free condition.  This issue is resolved by initializing vsk->trans to NULL.(CVE-2024-50264)\n\nIn the Linux kernel, the following vulnerability has been resolved:  dm cache: fix potential out-of-bounds access on the first resume  Out-of-bounds access occurs if the fast device is expanded unexpectedly before the first-time resume of the cache table. This happens because expanding the fast device requires reloading the cache table for cache_create to allocate new in-core data structures that fit the new size, and the check in cache_preresume is not performed during the first resume, leading to the issue.  Reproduce steps:  1. prepare component devices:  dmsetup create cmeta --table \"0 8192 linear /dev/sdc 0\" dmsetup create cdata --table \"0 65536 linear /dev/sdc 8192\" dmsetup create corig --table \"0 524288 linear /dev/sdc 262144\" dd if=/dev/zero of=/dev/mapper/cmeta bs=4k count=1 oflag=direct  2. load a cache table of 512 cache blocks, and deliberately expand the    fast device before resuming the cache, making the in-core data    structures inadequate.  dmsetup create cache --notable dmsetup reload cache --table \"0 524288 cache /dev/mapper/cmeta \\ /dev/mapper/cdata /dev/mapper/corig 128 2 metadata2 writethrough smq 0\" dmsetup reload cdata --table \"0 131072 linear /dev/sdc 8192\" dmsetup resume cdata dmsetup resume cache  3. suspend the cache to write out the in-core dirty bitset and hint    array, leading to out-of-bounds access to the dirty bitset at offset    0x40:  dmsetup suspend cache  KASAN reports:    BUG: KASAN: vmalloc-out-of-bounds in is_dirty_callback+0x2b/0x80   Read of size 8 at addr ffffc90000085040 by task dmsetup/90    (...snip...)   The buggy address belongs to the virtual mapping at    [ffffc90000085000, ffffc90000087000) created by:    cache_ctr+0x176a/0x35f0    (...snip...)   Memory state around the buggy address:    ffffc90000084f00: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8    ffffc90000084f80: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8   >ffffc90000085000: 00 00 00 00 00 00 00 00 f8 f8 f8 f8 f8 f8 f8 f8                                              ^    ffffc90000085080: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8    ffffc90000085100: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8  Fix by checking the size change on the first resume.(CVE-2024-50278)\n\nIn the Linux kernel, the following vulnerability has been resolved:  drm/amdgpu: add missing size check in amdgpu_debugfs_gprwave_read()  Avoid a possible buffer overflow if size is larger than 4K.  (cherry picked from commit f5d873f5825b40d886d03bd2aede91d4cf002434)(CVE-2024-50282)\n\nIn the Linux kernel, the following vulnerability has been resolved:  ksmbd: check outstanding simultaneous SMB operations  If Client send simultaneous SMB operations to ksmbd, It exhausts too much memory through the \"ksmbd_work_cache”. It will cause OOM issue. ksmbd has a credit mechanism but it can't handle this problem. This patch add the check if it exceeds max credits to prevent this problem by assuming that one smb request consumes at least one credit.(CVE-2024-50285)\n\nIn the Linux kernel, the following vulnerability has been resolved:  ksmbd: fix slab-use-after-free in ksmbd_smb2_session_create  There is a race condition between ksmbd_smb2_session_create and ksmbd_expire_session. This patch add missing sessions_table_lock while adding/deleting session from global session table.(CVE-2024-50286)\n\nIn the Linux kernel, the following vulnerability has been resolved:  regulator: rtq2208: Fix uninitialized use of regulator_config  Fix rtq2208 driver uninitialized use to cause kernel error.(CVE-2024-50300)\n\nIn the Linux kernel, the following vulnerability has been resolved:  ipv4: ip_tunnel: Fix suspicious RCU usage warning in ip_tunnel_init_flow()  There are code paths from which the function is called without holding the RCU read lock, resulting in a suspicious RCU usage warning [1].  Fix by using l3mdev_master_upper_ifindex_by_index() which will acquire the RCU read lock before calling l3mdev_master_upper_ifindex_by_index_rcu().  [1] WARNING: suspicious RCU usage 6.12.0-rc3-custom-gac8f72681cf2 #141 Not tainted ----------------------------- net/core/dev.c:876 RCU-list traversed in non-reader section!!  other info that might help us debug this:  rcu_scheduler_active = 2, debug_locks = 1 1 lock held by ip/361:  #0: ffffffff86fc7cb0 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x377/0xf60  stack backtrace: CPU: 3 UID: 0 PID: 361 Comm: ip Not tainted 6.12.0-rc3-custom-gac8f72681cf2 #141 Hardware name: Bochs Bochs, BIOS Bochs 01/01/2011 Call Trace:  <TASK>  dump_stack_lvl+0xba/0x110  lockdep_rcu_suspicious.cold+0x4f/0xd6  dev_get_by_index_rcu+0x1d3/0x210  l3mdev_master_upper_ifindex_by_index_rcu+0x2b/0xf0  ip_tunnel_bind_dev+0x72f/0xa00  ip_tunnel_newlink+0x368/0x7a0  ipgre_newlink+0x14c/0x170  __rtnl_newlink+0x1173/0x19c0  rtnl_newlink+0x6c/0xa0  rtnetlink_rcv_msg+0x3cc/0xf60  netlink_rcv_skb+0x171/0x450  netlink_unicast+0x539/0x7f0  netlink_sendmsg+0x8c1/0xd80  ____sys_sendmsg+0x8f9/0xc20  ___sys_sendmsg+0x197/0x1e0  __sys_sendmsg+0x122/0x1f0  do_syscall_64+0xbb/0x1d0  entry_SYSCALL_64_after_hwframe+0x77/0x7f(CVE-2024-53042)\n\nIn the Linux kernel, the following vulnerability has been resolved:  wifi: iwlwifi: mvm: Fix response handling in iwl_mvm_send_recovery_cmd()  1. The size of the response packet is not validated. 2. The response buffer is not freed.  Resolve these issues by switching to iwl_mvm_send_cmd_status(), which handles both size validation and frees the buffer.(CVE-2024-53059)\n\nIn the Linux kernel, the following vulnerability has been resolved:  drm/amdgpu: prevent NULL pointer dereference if ATIF is not supported  acpi_evaluate_object() may return AE_NOT_FOUND (failure), which would result in dereferencing buffer.pointer (obj) while being NULL.  Although this case may be unrealistic for the current code, it is still better to protect against possible bugs.  Bail out also when status is AE_NOT_FOUND.  This fixes 1 FORWARD_NULL issue reported by Coverity Report: CID 1600951:  Null pointer dereferences  (FORWARD_NULL)  (cherry picked from commit 91c9e221fe2553edf2db71627d8453f083de87a1)(CVE-2024-53060)\n\nIn the Linux kernel, the following vulnerability has been resolved:  NFSD: Never decrement pending_async_copies on error  The error flow in nfsd4_copy() calls cleanup_async_copy(), which already decrements nn->pending_async_copies.(CVE-2024-53073)\n\nIn the Linux kernel, the following vulnerability has been resolved:  afs: Fix lock recursion  afs_wake_up_async_call() can incur lock recursion.  The problem is that it is called from AF_RXRPC whilst holding the ->notify_lock, but it tries to take a ref on the afs_call struct in order to pass it to a work queue - but if the afs_call is already queued, we then have an extraneous ref that must be put... calling afs_put_call() may call back down into AF_RXRPC through rxrpc_kernel_shutdown_call(), however, which might try taking the ->notify_lock again.  This case isn't very common, however, so defer it to a workqueue.  The oops looks something like:    BUG: spinlock recursion on CPU#0, krxrpcio/7001/1646    lock: 0xffff888141399b30, .magic: dead4ead, .owner: krxrpcio/7001/1646, .owner_cpu: 0   CPU: 0 UID: 0 PID: 1646 Comm: krxrpcio/7001 Not tainted 6.12.0-rc2-build3+ #4351   Hardware name: ASUS All Series/H97-PLUS, BIOS 2306 10/09/2014   Call Trace:    <TASK>    dump_stack_lvl+0x47/0x70    do_raw_spin_lock+0x3c/0x90    rxrpc_kernel_shutdown_call+0x83/0xb0    afs_put_call+0xd7/0x180    rxrpc_notify_socket+0xa0/0x190    rxrpc_input_split_jumbo+0x198/0x1d0    rxrpc_input_data+0x14b/0x1e0    ? rxrpc_input_call_packet+0xc2/0x1f0    rxrpc_input_call_event+0xad/0x6b0    rxrpc_input_packet_on_conn+0x1e1/0x210    rxrpc_input_packet+0x3f2/0x4d0    rxrpc_io_thread+0x243/0x410    ? __pfx_rxrpc_io_thread+0x10/0x10    kthread+0xcf/0xe0    ? __pfx_kthread+0x10/0x10    ret_from_fork+0x24/0x40    ? __pfx_kthread+0x10/0x10    ret_from_fork_asm+0x1a/0x30    </TASK>(CVE-2024-53090)",
				"category":"general",
				"title":"Description"
			},
			{
				"text":"An update for kernel is now available for openEuler-24.03-LTS.\n\nopenEuler Security has rated this update as having a security impact of high. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.",
				"category":"general",
				"title":"Topic"
			},
			{
				"text":"High",
				"category":"general",
				"title":"Severity"
			},
			{
				"text":"kernel",
				"category":"general",
				"title":"Affected Component"
			}
		],
		"publisher":{
			"issuing_authority":"openEuler security committee",
			"name":"openEuler",
			"namespace":"https://www.openeuler.org",
			"contact_details":"openeuler-security@openeuler.org",
			"category":"vendor"
		},
		"references":[
			{
				"summary":"openEuler-SA-2024-2522",
				"category":"self",
				"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2522"
			},
			{
				"summary":"CVE-2024-39483",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-39483&packageName=kernel"
			},
			{
				"summary":"CVE-2024-44950",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-44950&packageName=kernel"
			},
			{
				"summary":"CVE-2024-45026",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-45026&packageName=kernel"
			},
			{
				"summary":"CVE-2024-46808",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-46808&packageName=kernel"
			},
			{
				"summary":"CVE-2024-46813",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-46813&packageName=kernel"
			},
			{
				"summary":"CVE-2024-46825",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-46825&packageName=kernel"
			},
			{
				"summary":"CVE-2024-47682",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-47682&packageName=kernel"
			},
			{
				"summary":"CVE-2024-47706",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-47706&packageName=kernel"
			},
			{
				"summary":"CVE-2024-47714",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-47714&packageName=kernel"
			},
			{
				"summary":"CVE-2024-47715",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-47715&packageName=kernel"
			},
			{
				"summary":"CVE-2024-47718",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-47718&packageName=kernel"
			},
			{
				"summary":"CVE-2024-47734",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-47734&packageName=kernel"
			},
			{
				"summary":"CVE-2024-47740",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-47740&packageName=kernel"
			},
			{
				"summary":"CVE-2024-47750",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-47750&packageName=kernel"
			},
			{
				"summary":"CVE-2024-47754",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-47754&packageName=kernel"
			},
			{
				"summary":"CVE-2024-49851",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-49851&packageName=kernel"
			},
			{
				"summary":"CVE-2024-49861",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-49861&packageName=kernel"
			},
			{
				"summary":"CVE-2024-49890",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-49890&packageName=kernel"
			},
			{
				"summary":"CVE-2024-49891",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-49891&packageName=kernel"
			},
			{
				"summary":"CVE-2024-49907",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-49907&packageName=kernel"
			},
			{
				"summary":"CVE-2024-49929",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-49929&packageName=kernel"
			},
			{
				"summary":"CVE-2024-49982",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-49982&packageName=kernel"
			},
			{
				"summary":"CVE-2024-50001",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-50001&packageName=kernel"
			},
			{
				"summary":"CVE-2024-50010",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-50010&packageName=kernel"
			},
			{
				"summary":"CVE-2024-50023",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-50023&packageName=kernel"
			},
			{
				"summary":"CVE-2024-50044",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-50044&packageName=kernel"
			},
			{
				"summary":"CVE-2024-50048",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-50048&packageName=kernel"
			},
			{
				"summary":"CVE-2024-50078",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-50078&packageName=kernel"
			},
			{
				"summary":"CVE-2024-50086",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-50086&packageName=kernel"
			},
			{
				"summary":"CVE-2024-50101",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-50101&packageName=kernel"
			},
			{
				"summary":"CVE-2024-50108",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-50108&packageName=kernel"
			},
			{
				"summary":"CVE-2024-50126",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-50126&packageName=kernel"
			},
			{
				"summary":"CVE-2024-50127",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-50127&packageName=kernel"
			},
			{
				"summary":"CVE-2024-50128",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-50128&packageName=kernel"
			},
			{
				"summary":"CVE-2024-50130",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-50130&packageName=kernel"
			},
			{
				"summary":"CVE-2024-50135",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-50135&packageName=kernel"
			},
			{
				"summary":"CVE-2024-50137",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-50137&packageName=kernel"
			},
			{
				"summary":"CVE-2024-50139",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-50139&packageName=kernel"
			},
			{
				"summary":"CVE-2024-50150",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-50150&packageName=kernel"
			},
			{
				"summary":"CVE-2024-50155",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-50155&packageName=kernel"
			},
			{
				"summary":"CVE-2024-50158",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-50158&packageName=kernel"
			},
			{
				"summary":"CVE-2024-50163",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-50163&packageName=kernel"
			},
			{
				"summary":"CVE-2024-50164",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-50164&packageName=kernel"
			},
			{
				"summary":"CVE-2024-50187",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-50187&packageName=kernel"
			},
			{
				"summary":"CVE-2024-50188",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-50188&packageName=kernel"
			},
			{
				"summary":"CVE-2024-50196",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-50196&packageName=kernel"
			},
			{
				"summary":"CVE-2024-50201",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-50201&packageName=kernel"
			},
			{
				"summary":"CVE-2024-50211",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-50211&packageName=kernel"
			},
			{
				"summary":"CVE-2024-50218",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-50218&packageName=kernel"
			},
			{
				"summary":"CVE-2024-50222",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-50222&packageName=kernel"
			},
			{
				"summary":"CVE-2024-50226",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-50226&packageName=kernel"
			},
			{
				"summary":"CVE-2024-50229",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-50229&packageName=kernel"
			},
			{
				"summary":"CVE-2024-50235",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-50235&packageName=kernel"
			},
			{
				"summary":"CVE-2024-50259",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-50259&packageName=kernel"
			},
			{
				"summary":"CVE-2024-50261",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-50261&packageName=kernel"
			},
			{
				"summary":"CVE-2024-50264",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-50264&packageName=kernel"
			},
			{
				"summary":"CVE-2024-50278",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-50278&packageName=kernel"
			},
			{
				"summary":"CVE-2024-50282",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-50282&packageName=kernel"
			},
			{
				"summary":"CVE-2024-50285",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-50285&packageName=kernel"
			},
			{
				"summary":"CVE-2024-50286",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-50286&packageName=kernel"
			},
			{
				"summary":"CVE-2024-50300",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-50300&packageName=kernel"
			},
			{
				"summary":"CVE-2024-53042",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-53042&packageName=kernel"
			},
			{
				"summary":"CVE-2024-53059",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-53059&packageName=kernel"
			},
			{
				"summary":"CVE-2024-53060",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-53060&packageName=kernel"
			},
			{
				"summary":"CVE-2024-53073",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-53073&packageName=kernel"
			},
			{
				"summary":"CVE-2024-53090",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-53090&packageName=kernel"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-39483"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-44950"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-45026"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-46808"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-46813"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-46825"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-47682"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-47706"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-47714"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-47715"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-47718"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-47734"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-47740"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-47750"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-47754"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-49851"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-49861"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-49890"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-49891"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-49907"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-49929"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-49982"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50001"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50010"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50023"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50044"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50048"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50078"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50086"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50101"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50108"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50126"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50127"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50128"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50130"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50135"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50137"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50139"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50150"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50155"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50158"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50163"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50164"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50187"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50188"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50196"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50201"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50211"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50218"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50222"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50226"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50229"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50235"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50259"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50261"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50264"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50278"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50282"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50285"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50286"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50300"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-53042"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-53059"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-53060"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-53073"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-53090"
			},
			{
				"summary":"openEuler-SA-2024-2522 vex file",
				"category":"self",
				"url":"https://repo.openeuler.org/security/data/csaf/advisories/2024/csaf-openeuler-sa-2024-2522.json"
			}
		],
		"title":"An update for kernel is now available for openEuler-24.03-LTS",
		"tracking":{
			"initial_release_date":"2024-12-06T23:24:04+08:00",
			"revision_history":[
				{
					"date":"2024-12-06T23:24:04+08:00",
					"summary":"Initial",
					"number":"1.0.0"
				}
			],
			"generator":{
				"date":"2024-12-06T23:24:04+08:00",
				"engine":{
					"name":"openEuler CSAF Tool V1.0"
				}
			},
			"current_release_date":"2024-12-06T23:24:04+08:00",
			"id":"openEuler-SA-2024-2522",
			"version":"1.0.0",
			"status":"final"
		}
	},
	"product_tree":{
		"branches":[
			{
				"name":"openEuler",
				"category":"vendor",
				"branches":[
					{
						"name":"openEuler",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"openEuler-24.03-LTS",
									"name":"openEuler-24.03-LTS"
								},
								"name":"openEuler-24.03-LTS",
								"category":"product_version"
							}
						],
						"category":"product_name"
					},
					{
						"name":"aarch64",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"bpftool-6.6.0-61.0.0.60.oe2403.aarch64.rpm",
									"name":"bpftool-6.6.0-61.0.0.60.oe2403.aarch64.rpm"
								},
								"name":"bpftool-6.6.0-61.0.0.60.oe2403.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64.rpm",
									"name":"bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64.rpm"
								},
								"name":"bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-6.6.0-61.0.0.60.oe2403.aarch64.rpm",
									"name":"kernel-6.6.0-61.0.0.60.oe2403.aarch64.rpm"
								},
								"name":"kernel-6.6.0-61.0.0.60.oe2403.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64.rpm",
									"name":"kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64.rpm"
								},
								"name":"kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64.rpm",
									"name":"kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64.rpm"
								},
								"name":"kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64.rpm",
									"name":"kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64.rpm"
								},
								"name":"kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64.rpm",
									"name":"kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64.rpm"
								},
								"name":"kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-source-6.6.0-61.0.0.60.oe2403.aarch64.rpm",
									"name":"kernel-source-6.6.0-61.0.0.60.oe2403.aarch64.rpm"
								},
								"name":"kernel-source-6.6.0-61.0.0.60.oe2403.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64.rpm",
									"name":"kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64.rpm"
								},
								"name":"kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64.rpm",
									"name":"kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64.rpm"
								},
								"name":"kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64.rpm",
									"name":"kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64.rpm"
								},
								"name":"kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"perf-6.6.0-61.0.0.60.oe2403.aarch64.rpm",
									"name":"perf-6.6.0-61.0.0.60.oe2403.aarch64.rpm"
								},
								"name":"perf-6.6.0-61.0.0.60.oe2403.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64.rpm",
									"name":"perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64.rpm"
								},
								"name":"perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"python3-perf-6.6.0-61.0.0.60.oe2403.aarch64.rpm",
									"name":"python3-perf-6.6.0-61.0.0.60.oe2403.aarch64.rpm"
								},
								"name":"python3-perf-6.6.0-61.0.0.60.oe2403.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64.rpm",
									"name":"python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64.rpm"
								},
								"name":"python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64.rpm",
								"category":"product_version"
							}
						],
						"category":"architecture"
					},
					{
						"name":"x86_64",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"bpftool-6.6.0-61.0.0.60.oe2403.x86_64.rpm",
									"name":"bpftool-6.6.0-61.0.0.60.oe2403.x86_64.rpm"
								},
								"name":"bpftool-6.6.0-61.0.0.60.oe2403.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64.rpm",
									"name":"bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64.rpm"
								},
								"name":"bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-6.6.0-61.0.0.60.oe2403.x86_64.rpm",
									"name":"kernel-6.6.0-61.0.0.60.oe2403.x86_64.rpm"
								},
								"name":"kernel-6.6.0-61.0.0.60.oe2403.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64.rpm",
									"name":"kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64.rpm"
								},
								"name":"kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64.rpm",
									"name":"kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64.rpm"
								},
								"name":"kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64.rpm",
									"name":"kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64.rpm"
								},
								"name":"kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64.rpm",
									"name":"kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64.rpm"
								},
								"name":"kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-source-6.6.0-61.0.0.60.oe2403.x86_64.rpm",
									"name":"kernel-source-6.6.0-61.0.0.60.oe2403.x86_64.rpm"
								},
								"name":"kernel-source-6.6.0-61.0.0.60.oe2403.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64.rpm",
									"name":"kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64.rpm"
								},
								"name":"kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64.rpm",
									"name":"kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64.rpm"
								},
								"name":"kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64.rpm",
									"name":"kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64.rpm"
								},
								"name":"kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"perf-6.6.0-61.0.0.60.oe2403.x86_64.rpm",
									"name":"perf-6.6.0-61.0.0.60.oe2403.x86_64.rpm"
								},
								"name":"perf-6.6.0-61.0.0.60.oe2403.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64.rpm",
									"name":"perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64.rpm"
								},
								"name":"perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"python3-perf-6.6.0-61.0.0.60.oe2403.x86_64.rpm",
									"name":"python3-perf-6.6.0-61.0.0.60.oe2403.x86_64.rpm"
								},
								"name":"python3-perf-6.6.0-61.0.0.60.oe2403.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64.rpm",
									"name":"python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64.rpm"
								},
								"name":"python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64.rpm",
								"category":"product_version"
							}
						],
						"category":"architecture"
					},
					{
						"name":"src",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-6.6.0-61.0.0.60.oe2403.src.rpm",
									"name":"kernel-6.6.0-61.0.0.60.oe2403.src.rpm"
								},
								"name":"kernel-6.6.0-61.0.0.60.oe2403.src.rpm",
								"category":"product_version"
							}
						],
						"category":"architecture"
					}
				]
			}
		],
		"relationships":[
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"bpftool-6.6.0-61.0.0.60.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
					"name":"bpftool-6.6.0-61.0.0.60.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"name":"bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-6.6.0-61.0.0.60.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
					"name":"kernel-6.6.0-61.0.0.60.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"name":"kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
					"name":"kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
					"name":"kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
					"name":"kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-source-6.6.0-61.0.0.60.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
					"name":"kernel-source-6.6.0-61.0.0.60.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
					"name":"kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"name":"kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
					"name":"kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"perf-6.6.0-61.0.0.60.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
					"name":"perf-6.6.0-61.0.0.60.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"name":"perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"python3-perf-6.6.0-61.0.0.60.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
					"name":"python3-perf-6.6.0-61.0.0.60.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"name":"python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"bpftool-6.6.0-61.0.0.60.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
					"name":"bpftool-6.6.0-61.0.0.60.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"name":"bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-6.6.0-61.0.0.60.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
					"name":"kernel-6.6.0-61.0.0.60.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"name":"kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
					"name":"kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
					"name":"kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
					"name":"kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-source-6.6.0-61.0.0.60.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
					"name":"kernel-source-6.6.0-61.0.0.60.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
					"name":"kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"name":"kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
					"name":"kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"perf-6.6.0-61.0.0.60.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
					"name":"perf-6.6.0-61.0.0.60.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"name":"perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"python3-perf-6.6.0-61.0.0.60.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
					"name":"python3-perf-6.6.0-61.0.0.60.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"name":"python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-6.6.0-61.0.0.60.oe2403.src.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src",
					"name":"kernel-6.6.0-61.0.0.60.oe2403.src as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			}
		]
	},
	"vulnerabilities":[
		{
			"cve":"CVE-2024-39483",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nKVM: SVM: WARN on vNMI + NMI window iff NMIs are outright masked\n\nWhen requesting an NMI window, WARN on vNMI support being enabled if and\nonly if NMIs are actually masked, i.e. if the vCPU is already handling an\nNMI.  KVM's ABI for NMIs that arrive simultanesouly (from KVM's point of\nview) is to inject one NMI and pend the other.  When using vNMI, KVM pends\nthe second NMI simply by setting V_NMI_PENDING, and lets the CPU do the\nrest (hardware automatically sets V_NMI_BLOCKING when an NMI is injected).\n\nHowever, if KVM can't immediately inject an NMI, e.g. because the vCPU is\nin an STI shadow or is running with GIF=0, then KVM will request an NMI\nwindow and trigger the WARN (but still function correctly).\n\nWhether or not the GIF=0 case makes sense is debatable, as the intent of\nKVM's behavior is to provide functionality that is as close to real\nhardware as possible.  E.g. if two NMIs are sent in quick succession, the\nprobability of both NMIs arriving in an STI shadow is infinitesimally low\non real hardware, but significantly larger in a virtual environment, e.g.\nif the vCPU is preempted in the STI shadow.  For GIF=0, the argument isn't\nas clear cut, because the window where two NMIs can collide is much larger\nin bare metal (though still small).\n\nThat said, KVM should not have divergent behavior for the GIF=0 case based\non whether or not vNMI support is enabled.  And KVM has allowed\nsimultaneous NMIs with GIF=0 for over a decade, since commit 7460fb4a3400\n(\"KVM: Fix simultaneous NMIs\").  I.e. KVM's GIF=0 handling shouldn't be\nmodified without a *really* good reason to do so, and if KVM's behavior\nwere to be modified, it should be done irrespective of vNMI support.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2522"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-39483"
		},
		{
			"cve":"CVE-2024-44950",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nserial: sc16is7xx: fix invalid FIFO access with special register set\n\nWhen enabling access to the special register set, Receiver time-out and\nRHR interrupts can happen. In this case, the IRQ handler will try to read\nfrom the FIFO thru the RHR register at address 0x00, but address 0x00 is\nmapped to DLL register, resulting in erroneous FIFO reading.\n\nCall graph example:\n    sc16is7xx_startup(): entry\n    sc16is7xx_ms_proc(): entry\n    sc16is7xx_set_termios(): entry\n    sc16is7xx_set_baud(): DLH/DLL = $009C --> access special register set\n    sc16is7xx_port_irq() entry            --> IIR is 0x0C\n    sc16is7xx_handle_rx() entry\n    sc16is7xx_fifo_read(): --> unable to access FIFO (RHR) because it is\n                               mapped to DLL (LCR=LCR_CONF_MODE_A)\n    sc16is7xx_set_baud(): exit --> Restore access to general register set\n\nFix the problem by claiming the efr_lock mutex when accessing the Special\nregister set.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2522"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-44950"
		},
		{
			"cve":"CVE-2024-45026",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\ns390/dasd: fix error recovery leading to data corruption on ESE devices\n\nExtent Space Efficient (ESE) or thin provisioned volumes need to be\nformatted on demand during usual IO processing.\n\nThe dasd_ese_needs_format function checks for error codes that signal\nthe non existence of a proper track format.\n\nThe check for incorrect length is to imprecise since other error cases\nleading to transport of insufficient data also have this flag set.\nThis might lead to data corruption in certain error cases for example\nduring a storage server warmstart.\n\nFix by removing the check for incorrect length and replacing by\nexplicitly checking for invalid track format in transport mode.\n\nAlso remove the check for file protected since this is not a valid\nESE handling case.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2522"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.8,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2024-45026"
		},
		{
			"cve":"CVE-2024-46808",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Add missing NULL pointer check within dpcd_extend_address_range\n\n[Why & How]\nASSERT if return NULL from kcalloc.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2522"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-46808"
		},
		{
			"cve":"CVE-2024-46813",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Check link_index before accessing dc->links[]\n\n[WHY & HOW]\ndc->links[] has max size of MAX_LINKS and NULL is return when trying to\naccess with out-of-bound index.\n\nThis fixes 3 OVERRUN and 1 RESOURCE_LEAK issues reported by Coverity.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2522"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.8,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2024-46813"
		},
		{
			"cve":"CVE-2024-46825",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: iwlwifi: mvm: use IWL_FW_CHECK for link ID check\n\nThe lookup function iwl_mvm_rcu_fw_link_id_to_link_conf() is\nnormally called with input from the firmware, so it should use\nIWL_FW_CHECK() instead of WARN_ON().",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2522"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-46825"
		},
		{
			"cve":"CVE-2024-47682",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: sd: Fix off-by-one error in sd_read_block_characteristics()\n\nFf the device returns page 0xb1 with length 8 (happens with qemu v2.x, for\nexample), sd_read_block_characteristics() may attempt an out-of-bounds\nmemory access when accessing the zoned field at offset 8.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2522"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.8,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2024-47682"
		},
		{
			"cve":"CVE-2024-47706",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nblock, bfq: fix possible UAF for bfqq->bic with merge chain\n\n1) initial state, three tasks:\n\n\t\tProcess 1       Process 2\tProcess 3\n\t\t (BIC1)          (BIC2)\t\t (BIC3)\n\t\t  |  Λ            |  Λ\t\t  |  Λ\n\t\t  |  |            |  |\t\t  |  |\n\t\t  V  |            V  |\t\t  V  |\n\t\t  bfqq1           bfqq2\t\t  bfqq3\nprocess ref:\t   1\t\t    1\t\t    1\n\n2) bfqq1 merged to bfqq2:\n\n\t\tProcess 1       Process 2\tProcess 3\n\t\t (BIC1)          (BIC2)\t\t (BIC3)\n\t\t  |               |\t\t  |  Λ\n\t\t  \\--------------\\|\t\t  |  |\n\t\t                  V\t\t  V  |\n\t\t  bfqq1--------->bfqq2\t\t  bfqq3\nprocess ref:\t   0\t\t    2\t\t    1\n\n3) bfqq2 merged to bfqq3:\n\n\t\tProcess 1       Process 2\tProcess 3\n\t\t (BIC1)          (BIC2)\t\t (BIC3)\n\t here -> Λ                |\t\t  |\n\t\t  \\--------------\\ \\-------------\\|\n\t\t                  V\t\t  V\n\t\t  bfqq1--------->bfqq2---------->bfqq3\nprocess ref:\t   0\t\t    1\t\t    3\n\nIn this case, IO from Process 1 will get bfqq2 from BIC1 first, and then\nget bfqq3 through merge chain, and finially handle IO by bfqq3.\nHowerver, current code will think bfqq2 is owned by BIC1, like initial\nstate, and set bfqq2->bic to BIC1.\n\nbfq_insert_request\n-> by Process 1\n bfqq = bfq_init_rq(rq)\n  bfqq = bfq_get_bfqq_handle_split\n   bfqq = bic_to_bfqq\n   -> get bfqq2 from BIC1\n bfqq->ref++\n rq->elv.priv[0] = bic\n rq->elv.priv[1] = bfqq\n if (bfqq_process_refs(bfqq) == 1)\n  bfqq->bic = bic\n  -> record BIC1 to bfqq2\n\n  __bfq_insert_request\n   new_bfqq = bfq_setup_cooperator\n   -> get bfqq3 from bfqq2->new_bfqq\n   bfqq_request_freed(bfqq)\n   new_bfqq->ref++\n   rq->elv.priv[1] = new_bfqq\n   -> handle IO by bfqq3\n\nFix the problem by checking bfqq is from merge chain fist. And this\nmight fix a following problem reported by our syzkaller(unreproducible):\n\n==================================================================\nBUG: KASAN: slab-use-after-free in bfq_do_early_stable_merge block/bfq-iosched.c:5692 [inline]\nBUG: KASAN: slab-use-after-free in bfq_do_or_sched_stable_merge block/bfq-iosched.c:5805 [inline]\nBUG: KASAN: slab-use-after-free in bfq_get_queue+0x25b0/0x2610 block/bfq-iosched.c:5889\nWrite of size 1 at addr ffff888123839eb8 by task kworker/0:1H/18595\n\nCPU: 0 PID: 18595 Comm: kworker/0:1H Tainted: G             L     6.6.0-07439-gba2303cacfda #6\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014\nWorkqueue: kblockd blk_mq_requeue_work\nCall Trace:\n <TASK>\n __dump_stack lib/dump_stack.c:88 [inline]\n dump_stack_lvl+0x91/0xf0 lib/dump_stack.c:106\n print_address_description mm/kasan/report.c:364 [inline]\n print_report+0x10d/0x610 mm/kasan/report.c:475\n kasan_report+0x8e/0xc0 mm/kasan/report.c:588\n bfq_do_early_stable_merge block/bfq-iosched.c:5692 [inline]\n bfq_do_or_sched_stable_merge block/bfq-iosched.c:5805 [inline]\n bfq_get_queue+0x25b0/0x2610 block/bfq-iosched.c:5889\n bfq_get_bfqq_handle_split+0x169/0x5d0 block/bfq-iosched.c:6757\n bfq_init_rq block/bfq-iosched.c:6876 [inline]\n bfq_insert_request block/bfq-iosched.c:6254 [inline]\n bfq_insert_requests+0x1112/0x5cf0 block/bfq-iosched.c:6304\n blk_mq_insert_request+0x290/0x8d0 block/blk-mq.c:2593\n blk_mq_requeue_work+0x6bc/0xa70 block/blk-mq.c:1502\n process_one_work kernel/workqueue.c:2627 [inline]\n process_scheduled_works+0x432/0x13f0 kernel/workqueue.c:2700\n worker_thread+0x6f2/0x1160 kernel/workqueue.c:2781\n kthread+0x33c/0x440 kernel/kthread.c:388\n ret_from_fork+0x4d/0x80 arch/x86/kernel/process.c:147\n ret_from_fork_asm+0x1b/0x30 arch/x86/entry/entry_64.S:305\n </TASK>\n\nAllocated by task 20776:\n kasan_save_stack+0x20/0x40 mm/kasan/common.c:45\n kasan_set_track+0x25/0x30 mm/kasan/common.c:52\n __kasan_slab_alloc+0x87/0x90 mm/kasan/common.c:328\n kasan_slab_alloc include/linux/kasan.h:188 [inline]\n slab_post_alloc_hook mm/slab.h:763 [inline]\n slab_alloc_node mm/slub.c:3458 [inline]\n kmem_cache_alloc_node+0x1a4/0x6f0 mm/slub.c:3503\n ioc_create_icq block/blk-ioc.c:370 [inline]\n---truncated---",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2522"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-47706"
		},
		{
			"cve":"CVE-2024-47714",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: mt76: mt7996: use hweight16 to get correct tx antenna\n\nThe chainmask is u16 so using hweight8 cannot get correct tx_ant.\nWithout this patch, the tx_ant of band 2 would be -1 and lead to the\nfollowing issue:\nBUG: KASAN: stack-out-of-bounds in mt7996_mcu_add_sta+0x12e0/0x16e0 [mt7996e]",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2522"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-47714"
		},
		{
			"cve":"CVE-2024-47715",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: mt76: mt7915: fix oops on non-dbdc mt7986\n\nmt7915_band_config() sets band_idx = 1 on the main phy for mt7986\nwith MT7975_ONE_ADIE or MT7976_ONE_ADIE.\n\nCommit 0335c034e726 (\"wifi: mt76: fix race condition related to\nchecking tx queue fill status\") introduced a dereference of the\nphys array indirectly indexed by band_idx via wcid->phy_idx in\nmt76_wcid_cleanup(). This caused the following Oops on affected\nmt7986 devices:\n\n Unable to handle kernel read from unreadable memory at virtual address 0000000000000024\n Mem abort info:\n   ESR = 0x0000000096000005\n   EC = 0x25: DABT (current EL), IL = 32 bits\n   SET = 0, FnV = 0\n   EA = 0, S1PTW = 0\n   FSC = 0x05: level 1 translation fault\n Data abort info:\n   ISV = 0, ISS = 0x00000005\n   CM = 0, WnR = 0\n user pgtable: 4k pages, 39-bit VAs, pgdp=0000000042545000\n [0000000000000024] pgd=0000000000000000, p4d=0000000000000000, pud=0000000000000000\n Internal error: Oops: 0000000096000005 [#1] SMP\n Modules linked in: ... mt7915e mt76_connac_lib mt76 mac80211 cfg80211 ...\n CPU: 2 PID: 1631 Comm: hostapd Not tainted 5.15.150 #0\n Hardware name: ZyXEL EX5700 (Telenor) (DT)\n pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n pc : mt76_wcid_cleanup+0x84/0x22c [mt76]\n lr : mt76_wcid_cleanup+0x64/0x22c [mt76]\n sp : ffffffc00a803700\n x29: ffffffc00a803700 x28: ffffff80008f7300 x27: ffffff80003f3c00\n x26: ffffff80000a7880 x25: ffffffc008c26e00 x24: 0000000000000001\n x23: ffffffc000a68114 x22: 0000000000000000 x21: ffffff8004172cc8\n x20: ffffffc00a803748 x19: ffffff8004152020 x18: 0000000000000000\n x17: 00000000000017c0 x16: ffffffc008ef5000 x15: 0000000000000be0\n x14: ffffff8004172e28 x13: ffffff8004172e28 x12: 0000000000000000\n x11: 0000000000000000 x10: ffffff8004172e30 x9 : ffffff8004172e28\n x8 : 0000000000000000 x7 : ffffff8004156020 x6 : 0000000000000000\n x5 : 0000000000000031 x4 : 0000000000000000 x3 : 0000000000000001\n x2 : 0000000000000000 x1 : ffffff80008f7300 x0 : 0000000000000024\n Call trace:\n  mt76_wcid_cleanup+0x84/0x22c [mt76]\n  __mt76_sta_remove+0x70/0xbc [mt76]\n  mt76_sta_state+0x8c/0x1a4 [mt76]\n  mt7915_eeprom_get_power_delta+0x11e4/0x23a0 [mt7915e]\n  drv_sta_state+0x144/0x274 [mac80211]\n  sta_info_move_state+0x1cc/0x2a4 [mac80211]\n  sta_set_sinfo+0xaf8/0xc24 [mac80211]\n  sta_info_destroy_addr_bss+0x4c/0x6c [mac80211]\n\n  ieee80211_color_change_finish+0x1c08/0x1e70 [mac80211]\n  cfg80211_check_station_change+0x1360/0x4710 [cfg80211]\n  genl_family_rcv_msg_doit+0xb4/0x110\n  genl_rcv_msg+0xd0/0x1bc\n  netlink_rcv_skb+0x58/0x120\n  genl_rcv+0x34/0x50\n  netlink_unicast+0x1f0/0x2ec\n  netlink_sendmsg+0x198/0x3d0\n  ____sys_sendmsg+0x1b0/0x210\n  ___sys_sendmsg+0x80/0xf0\n  __sys_sendmsg+0x44/0xa0\n  __arm64_sys_sendmsg+0x20/0x30\n  invoke_syscall.constprop.0+0x4c/0xe0\n  do_el0_svc+0x40/0xd0\n  el0_svc+0x14/0x4c\n  el0t_64_sync_handler+0x100/0x110\n  el0t_64_sync+0x15c/0x160\n Code: d2800002 910092c0 52800023 f9800011 (885f7c01)\n ---[ end trace 7e42dd9a39ed2281 ]---\n\nFix by using mt76_dev_phy() which will map band_idx to the correct phy\nfor all hardware combinations.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2522"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-47715"
		},
		{
			"cve":"CVE-2024-47718",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: rtw88: always wait for both firmware loading attempts\n\nIn 'rtw_wait_firmware_completion()', always wait for both (regular and\nwowlan) firmware loading attempts. Otherwise if 'rtw_usb_intf_init()'\nhas failed in 'rtw_usb_probe()', 'rtw_usb_disconnect()' may issue\n'ieee80211_free_hw()' when one of 'rtw_load_firmware_cb()' (usually\nthe wowlan one) is still in progress, causing UAF detected by KASAN.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2522"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.8,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2024-47718"
		},
		{
			"cve":"CVE-2024-47734",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nbonding: Fix unnecessary warnings and logs from bond_xdp_get_xmit_slave()\n\nsyzbot reported a WARNING in bond_xdp_get_xmit_slave. To reproduce\nthis[1], one bond device (bond1) has xdpdrv, which increases\nbpf_master_redirect_enabled_key. Another bond device (bond0) which is\nunsupported by XDP but its slave (veth3) has xdpgeneric that returns\nXDP_TX. This triggers WARN_ON_ONCE() from the xdp_master_redirect().\nTo reduce unnecessary warnings and improve log management, we need to\ndelete the WARN_ON_ONCE() and add ratelimit to the netdev_err().\n\n[1] Steps to reproduce:\n    # Needs tx_xdp with return XDP_TX;\n    ip l add veth0 type veth peer veth1\n    ip l add veth3 type veth peer veth4\n    ip l add bond0 type bond mode 6 # BOND_MODE_ALB, unsupported by XDP\n    ip l add bond1 type bond # BOND_MODE_ROUNDROBIN by default\n    ip l set veth0 master bond1\n    ip l set bond1 up\n    # Increases bpf_master_redirect_enabled_key\n    ip l set dev bond1 xdpdrv object tx_xdp.o section xdp_tx\n    ip l set veth3 master bond0\n    ip l set bond0 up\n    ip l set veth4 up\n    # Triggers WARN_ON_ONCE() from the xdp_master_redirect()\n    ip l set veth3 xdpgeneric object tx_xdp.o section xdp_tx",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2522"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-47734"
		},
		{
			"cve":"CVE-2024-47740",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nf2fs: Require FMODE_WRITE for atomic write ioctls\n\nThe F2FS ioctls for starting and committing atomic writes check for\ninode_owner_or_capable(), but this does not give LSMs like SELinux or\nLandlock an opportunity to deny the write access - if the caller's FSUID\nmatches the inode's UID, inode_owner_or_capable() immediately returns true.\n\nThere are scenarios where LSMs want to deny a process the ability to write\nparticular files, even files that the FSUID of the process owns; but this\ncan currently partially be bypassed using atomic write ioctls in two ways:\n\n - F2FS_IOC_START_ATOMIC_REPLACE + F2FS_IOC_COMMIT_ATOMIC_WRITE can\n   truncate an inode to size 0\n - F2FS_IOC_START_ATOMIC_WRITE + F2FS_IOC_ABORT_ATOMIC_WRITE can revert\n   changes another process concurrently made to a file\n\nFix it by requiring FMODE_WRITE for these operations, just like for\nF2FS_IOC_MOVE_RANGE. Since any legitimate caller should only be using these\nioctls when intending to write into the file, that seems unlikely to break\nanything.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2522"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-47740"
		},
		{
			"cve":"CVE-2024-47750",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/hns: Fix Use-After-Free of rsv_qp on HIP08\n\nCurrently rsv_qp is freed before ib_unregister_device() is called\non HIP08. During the time interval, users can still dereg MR and\nrsv_qp will be used in this process, leading to a UAF. Move the\nrelease of rsv_qp after calling ib_unregister_device() to fix it.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2522"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.8,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2024-47750"
		},
		{
			"cve":"CVE-2024-47754",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: mediatek: vcodec: Fix H264 multi stateless decoder smatch warning\n\nFix a smatch static checker warning on vdec_h264_req_multi_if.c.\nWhich leads to a kernel crash when fb is NULL.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2522"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-47754"
		},
		{
			"cve":"CVE-2024-49851",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\ntpm: Clean up TPM space after command failure\n\ntpm_dev_transmit prepares the TPM space before attempting command\ntransmission. However if the command fails no rollback of this\npreparation is done. This can result in transient handles being leaked\nif the device is subsequently closed with no further commands performed.\n\nFix this by flushing the space in the event of command transmission\nfailure.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2522"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-49851"
		},
		{
			"cve":"CVE-2024-49861",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Fix helper writes to read-only maps\n\nLonial found an issue that despite user- and BPF-side frozen BPF map\n(like in case of .rodata), it was still possible to write into it from\na BPF program side through specific helpers having ARG_PTR_TO_{LONG,INT}\nas arguments.\n\nIn check_func_arg() when the argument is as mentioned, the meta->raw_mode\nis never set. Later, check_helper_mem_access(), under the case of\nPTR_TO_MAP_VALUE as register base type, it assumes BPF_READ for the\nsubsequent call to check_map_access_type() and given the BPF map is\nread-only it succeeds.\n\nThe helpers really need to be annotated as ARG_PTR_TO_{LONG,INT} | MEM_UNINIT\nwhen results are written into them as opposed to read out of them. The\nlatter indicates that it's okay to pass a pointer to uninitialized memory\nas the memory is written to anyway.\n\nHowever, ARG_PTR_TO_{LONG,INT} is a special case of ARG_PTR_TO_FIXED_SIZE_MEM\njust with additional alignment requirement. So it is better to just get\nrid of the ARG_PTR_TO_{LONG,INT} special cases altogether and reuse the\nfixed size memory types. For this, add MEM_ALIGNED to additionally ensure\nalignment given these helpers write directly into the args via *<ptr> = val.\nThe .arg*_size has been initialized reflecting the actual sizeof(*<ptr>).\n\nMEM_ALIGNED can only be used in combination with MEM_FIXED_SIZE annotated\nargument types, since in !MEM_FIXED_SIZE cases the verifier does not know\nthe buffer size a priori and therefore cannot blindly write *<ptr> = val.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2522"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.1,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2024-49861"
		},
		{
			"cve":"CVE-2024-49890",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/pm: ensure the fw_info is not null before using it\n\nThis resolves the dereference null return value warning\nreported by Coverity.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2522"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-49890"
		},
		{
			"cve":"CVE-2024-49891",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: lpfc: Validate hdwq pointers before dereferencing in reset/errata paths\n\nWhen the HBA is undergoing a reset or is handling an errata event, NULL ptr\ndereference crashes may occur in routines such as\nlpfc_sli_flush_io_rings(), lpfc_dev_loss_tmo_callbk(), or\nlpfc_abort_handler().\n\nAdd NULL ptr checks before dereferencing hdwq pointers that may have been\nfreed due to operations colliding with a reset or errata event handler.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2522"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-49891"
		},
		{
			"cve":"CVE-2024-49907",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Check null pointers before using dc->clk_mgr\n\n[WHY & HOW]\ndc->clk_mgr is null checked previously in the same function, indicating\nit might be null.\n\nPassing \"dc\" to \"dc->hwss.apply_idle_power_optimizations\", which\ndereferences null \"dc->clk_mgr\". (The function pointer resolves to\n\"dcn35_apply_idle_power_optimizations\".)\n\nThis fixes 1 FORWARD_NULL issue reported by Coverity.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2522"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-49907"
		},
		{
			"cve":"CVE-2024-49929",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: iwlwifi: mvm: avoid NULL pointer dereference\n\niwl_mvm_tx_skb_sta() and iwl_mvm_tx_mpdu() verify that the mvmvsta\npointer is not NULL.\nIt retrieves this pointer using iwl_mvm_sta_from_mac80211, which is\ndereferencing the ieee80211_sta pointer.\nIf sta is NULL, iwl_mvm_sta_from_mac80211 will dereference a NULL\npointer.\nFix this by checking the sta pointer before retrieving the mvmsta\nfrom it. If sta is not NULL, then mvmsta isn't either.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2522"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-49929"
		},
		{
			"cve":"CVE-2024-49982",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\naoe: fix the potential use-after-free problem in more places\n\nFor fixing CVE-2023-6270, f98364e92662 (\"aoe: fix the potential\nuse-after-free problem in aoecmd_cfg_pkts\") makes tx() calling dev_put()\ninstead of doing in aoecmd_cfg_pkts(). It avoids that the tx() runs\ninto use-after-free.\n\nThen Nicolai Stange found more places in aoe have potential use-after-free\nproblem with tx(). e.g. revalidate(), aoecmd_ata_rw(), resend(), probe()\nand aoecmd_cfg_rsp(). Those functions also use aoenet_xmit() to push\npacket to tx queue. So they should also use dev_hold() to increase the\nrefcnt of skb->dev.\n\nOn the other hand, moving dev_put() to tx() causes that the refcnt of\nskb->dev be reduced to a negative value, because corresponding\ndev_hold() are not called in revalidate(), aoecmd_ata_rw(), resend(),\nprobe(), and aoecmd_cfg_rsp(). This patch fixed this issue.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2522"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.8,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2024-49982"
		},
		{
			"cve":"CVE-2024-50001",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx5: Fix error path in multi-packet WQE transmit\n\nRemove the erroneous unmap in case no DMA mapping was established\n\nThe multi-packet WQE transmit code attempts to obtain a DMA mapping for\nthe skb. This could fail, e.g. under memory pressure, when the IOMMU\ndriver just can't allocate more memory for page tables. While the code\ntries to handle this in the path below the err_unmap label it erroneously\nunmaps one entry from the sq's FIFO list of active mappings. Since the\ncurrent map attempt failed this unmap is removing some random DMA mapping\nthat might still be required. If the PCI function now presents that IOVA,\nthe IOMMU may assumes a rogue DMA access and e.g. on s390 puts the PCI\nfunction in error state.\n\nThe erroneous behavior was seen in a stress-test environment that created\nmemory pressure.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2522"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-50001"
		},
		{
			"cve":"CVE-2024-50010",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nexec: don't WARN for racy path_noexec check\n\nBoth i_mode and noexec checks wrapped in WARN_ON stem from an artifact\nof the previous implementation. They used to legitimately check for the\ncondition, but that got moved up in two commits:\n633fb6ac3980 (\"exec: move S_ISREG() check earlier\")\n0fd338b2d2cd (\"exec: move path_noexec() check earlier\")\n\nInstead of being removed said checks are WARN_ON'ed instead, which\nhas some debug value.\n\nHowever, the spurious path_noexec check is racy, resulting in\nunwarranted warnings should someone race with setting the noexec flag.\n\nOne can note there is more to perm-checking whether execve is allowed\nand none of the conditions are guaranteed to still hold after they were\ntested for.\n\nAdditionally this does not validate whether the code path did any perm\nchecking to begin with -- it will pass if the inode happens to be\nregular.\n\nKeep the redundant path_noexec() check even though it's mindless\nnonsense checking for guarantee that isn't given so drop the WARN.\n\nReword the commentary and do small tidy ups while here.\n\n[brauner: keep redundant path_noexec() check]",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2522"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":4.7,
						"vectorString":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-50010"
		},
		{
			"cve":"CVE-2024-50023",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nnet: phy: Remove LED entry from LEDs list on unregister\n\nCommit c938ab4da0eb (\"net: phy: Manual remove LEDs to ensure correct\nordering\") correctly fixed a problem with using devm_ but missed\nremoving the LED entry from the LEDs list.\n\nThis cause kernel panic on specific scenario where the port for the PHY\nis torn down and up and the kmod for the PHY is removed.\n\nOn setting the port down the first time, the assosiacted LEDs are\ncorrectly unregistered. The associated kmod for the PHY is now removed.\nThe kmod is now added again and the port is now put up, the associated LED\nare registered again.\nOn putting the port down again for the second time after these step, the\nLED list now have 4 elements. With the first 2 already unregistered\npreviously and the 2 new one registered again.\n\nThis cause a kernel panic as the first 2 element should have been\nremoved.\n\nFix this by correctly removing the element when LED is unregistered.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2522"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-50023"
		},
		{
			"cve":"CVE-2024-50044",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: RFCOMM: FIX possible deadlock in rfcomm_sk_state_change\n\nrfcomm_sk_state_change attempts to use sock_lock so it must never be\ncalled with it locked but rfcomm_sock_ioctl always attempt to lock it\ncausing the following trace:\n\n======================================================\nWARNING: possible circular locking dependency detected\n6.8.0-syzkaller-08951-gfe46a7dd189e #0 Not tainted\n------------------------------------------------------\nsyz-executor386/5093 is trying to acquire lock:\nffff88807c396258 (sk_lock-AF_BLUETOOTH-BTPROTO_RFCOMM){+.+.}-{0:0}, at: lock_sock include/net/sock.h:1671 [inline]\nffff88807c396258 (sk_lock-AF_BLUETOOTH-BTPROTO_RFCOMM){+.+.}-{0:0}, at: rfcomm_sk_state_change+0x5b/0x310 net/bluetooth/rfcomm/sock.c:73\n\nbut task is already holding lock:\nffff88807badfd28 (&d->lock){+.+.}-{3:3}, at: __rfcomm_dlc_close+0x226/0x6a0 net/bluetooth/rfcomm/core.c:491",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2522"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"LOW",
						"baseScore":3.3,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Low",
					"category":"impact"
				}
			],
			"title":"CVE-2024-50044"
		},
		{
			"cve":"CVE-2024-50048",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nfbcon: Fix a NULL pointer dereference issue in fbcon_putcs\n\nsyzbot has found a NULL pointer dereference bug in fbcon.\nHere is the simplified C reproducer:\n\nstruct param {\n\tuint8_t type;\n\tstruct tiocl_selection ts;\n};\n\nint main()\n{\n\tstruct fb_con2fbmap con2fb;\n\tstruct param param;\n\n\tint fd = open(\"/dev/fb1\", 0, 0);\n\n\tcon2fb.console = 0x19;\n\tcon2fb.framebuffer = 0;\n\tioctl(fd, FBIOPUT_CON2FBMAP, &con2fb);\n\n\tparam.type = 2;\n\tparam.ts.xs = 0; param.ts.ys = 0;\n\tparam.ts.xe = 0; param.ts.ye = 0;\n\tparam.ts.sel_mode = 0;\n\n\tint fd1 = open(\"/dev/tty1\", O_RDWR, 0);\n\tioctl(fd1, TIOCLINUX, &param);\n\n\tcon2fb.console = 1;\n\tcon2fb.framebuffer = 0;\n\tioctl(fd, FBIOPUT_CON2FBMAP, &con2fb);\n\n\treturn 0;\n}\n\nAfter calling ioctl(fd1, TIOCLINUX, &param), the subsequent ioctl(fd, FBIOPUT_CON2FBMAP, &con2fb)\ncauses the kernel to follow a different execution path:\n\n set_con2fb_map\n  -> con2fb_init_display\n   -> fbcon_set_disp\n    -> redraw_screen\n     -> hide_cursor\n      -> clear_selection\n       -> highlight\n        -> invert_screen\n         -> do_update_region\n          -> fbcon_putcs\n           -> ops->putcs\n\nSince ops->putcs is a NULL pointer, this leads to a kernel panic.\nTo prevent this, we need to call set_blitting_type() within set_con2fb_map()\nto properly initialize ops->putcs.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2522"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-50048"
		},
		{
			"cve":"CVE-2024-50078",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: Call iso_exit() on module unload\n\nIf iso_init() has been called, iso_exit() must be called on module\nunload. Without that, the struct proto that iso_init() registered with\nproto_register() becomes invalid, which could cause unpredictable\nproblems later. In my case, with CONFIG_LIST_HARDENED and\nCONFIG_BUG_ON_DATA_CORRUPTION enabled, loading the module again usually\ntriggers this BUG():\n\n  list_add corruption. next->prev should be prev (ffffffffb5355fd0),\n    but was 0000000000000068. (next=ffffffffc0a010d0).\n  ------------[ cut here ]------------\n  kernel BUG at lib/list_debug.c:29!\n  Oops: invalid opcode: 0000 [#1] PREEMPT SMP PTI\n  CPU: 1 PID: 4159 Comm: modprobe Not tainted 6.10.11-4+bt2-ao-desktop #1\n  RIP: 0010:__list_add_valid_or_report+0x61/0xa0\n  ...\n    __list_add_valid_or_report+0x61/0xa0\n    proto_register+0x299/0x320\n    hci_sock_init+0x16/0xc0 [bluetooth]\n    bt_init+0x68/0xd0 [bluetooth]\n    __pfx_bt_init+0x10/0x10 [bluetooth]\n    do_one_initcall+0x80/0x2f0\n    do_init_module+0x8b/0x230\n    __do_sys_init_module+0x15f/0x190\n    do_syscall_64+0x68/0x110\n  ...",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2522"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-50078"
		},
		{
			"cve":"CVE-2024-50086",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nksmbd: fix user-after-free from session log off\n\nThere is racy issue between smb2 session log off and smb2 session setup.\nIt will cause user-after-free from session log off.\nThis add session_lock when setting SMB2_SESSION_EXPIRED and referece\ncount to session struct not to free session while it is being used.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2522"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.0,
						"vectorString":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2024-50086"
		},
		{
			"cve":"CVE-2024-50101",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\niommu/vt-d: Fix incorrect pci_for_each_dma_alias() for non-PCI devices\n\nPreviously, the domain_context_clear() function incorrectly called\npci_for_each_dma_alias() to set up context entries for non-PCI devices.\nThis could lead to kernel hangs or other unexpected behavior.\n\nAdd a check to only call pci_for_each_dma_alias() for PCI devices. For\nnon-PCI devices, domain_context_clear_one() is called directly.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2522"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-50101"
		},
		{
			"cve":"CVE-2024-50108",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Disable PSR-SU on Parade 08-01 TCON too\n\nStuart Hayhurst has found that both at bootup and fullscreen VA-API video\nis leading to black screens for around 1 second and kernel WARNING [1] traces\nwhen calling dmub_psr_enable() with Parade 08-01 TCON.\n\nThese symptoms all go away with PSR-SU disabled for this TCON, so disable\nit for now while DMUB traces [2] from the failure can be analyzed and the failure\nstate properly root caused.\n\n(cherry picked from commit afb634a6823d8d9db23c5fb04f79c5549349628b)",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2522"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-50108"
		},
		{
			"cve":"CVE-2024-50126",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nnet: sched: use RCU read-side critical section in taprio_dump()\n\nFix possible use-after-free in 'taprio_dump()' by adding RCU\nread-side critical section there. Never seen on x86 but\nfound on a KASAN-enabled arm64 system when investigating\nhttps://syzkaller.appspot.com/bug?extid=b65e0af58423fc8a73aa:\n\n[T15862] BUG: KASAN: slab-use-after-free in taprio_dump+0xa0c/0xbb0\n[T15862] Read of size 4 at addr ffff0000d4bb88f8 by task repro/15862\n[T15862]\n[T15862] CPU: 0 UID: 0 PID: 15862 Comm: repro Not tainted 6.11.0-rc1-00293-gdefaf1a2113a-dirty #2\n[T15862] Hardware name: QEMU QEMU Virtual Machine, BIOS edk2-20240524-5.fc40 05/24/2024\n[T15862] Call trace:\n[T15862]  dump_backtrace+0x20c/0x220\n[T15862]  show_stack+0x2c/0x40\n[T15862]  dump_stack_lvl+0xf8/0x174\n[T15862]  print_report+0x170/0x4d8\n[T15862]  kasan_report+0xb8/0x1d4\n[T15862]  __asan_report_load4_noabort+0x20/0x2c\n[T15862]  taprio_dump+0xa0c/0xbb0\n[T15862]  tc_fill_qdisc+0x540/0x1020\n[T15862]  qdisc_notify.isra.0+0x330/0x3a0\n[T15862]  tc_modify_qdisc+0x7b8/0x1838\n[T15862]  rtnetlink_rcv_msg+0x3c8/0xc20\n[T15862]  netlink_rcv_skb+0x1f8/0x3d4\n[T15862]  rtnetlink_rcv+0x28/0x40\n[T15862]  netlink_unicast+0x51c/0x790\n[T15862]  netlink_sendmsg+0x79c/0xc20\n[T15862]  __sock_sendmsg+0xe0/0x1a0\n[T15862]  ____sys_sendmsg+0x6c0/0x840\n[T15862]  ___sys_sendmsg+0x1ac/0x1f0\n[T15862]  __sys_sendmsg+0x110/0x1d0\n[T15862]  __arm64_sys_sendmsg+0x74/0xb0\n[T15862]  invoke_syscall+0x88/0x2e0\n[T15862]  el0_svc_common.constprop.0+0xe4/0x2a0\n[T15862]  do_el0_svc+0x44/0x60\n[T15862]  el0_svc+0x50/0x184\n[T15862]  el0t_64_sync_handler+0x120/0x12c\n[T15862]  el0t_64_sync+0x190/0x194\n[T15862]\n[T15862] Allocated by task 15857:\n[T15862]  kasan_save_stack+0x3c/0x70\n[T15862]  kasan_save_track+0x20/0x3c\n[T15862]  kasan_save_alloc_info+0x40/0x60\n[T15862]  __kasan_kmalloc+0xd4/0xe0\n[T15862]  __kmalloc_cache_noprof+0x194/0x334\n[T15862]  taprio_change+0x45c/0x2fe0\n[T15862]  tc_modify_qdisc+0x6a8/0x1838\n[T15862]  rtnetlink_rcv_msg+0x3c8/0xc20\n[T15862]  netlink_rcv_skb+0x1f8/0x3d4\n[T15862]  rtnetlink_rcv+0x28/0x40\n[T15862]  netlink_unicast+0x51c/0x790\n[T15862]  netlink_sendmsg+0x79c/0xc20\n[T15862]  __sock_sendmsg+0xe0/0x1a0\n[T15862]  ____sys_sendmsg+0x6c0/0x840\n[T15862]  ___sys_sendmsg+0x1ac/0x1f0\n[T15862]  __sys_sendmsg+0x110/0x1d0\n[T15862]  __arm64_sys_sendmsg+0x74/0xb0\n[T15862]  invoke_syscall+0x88/0x2e0\n[T15862]  el0_svc_common.constprop.0+0xe4/0x2a0\n[T15862]  do_el0_svc+0x44/0x60\n[T15862]  el0_svc+0x50/0x184\n[T15862]  el0t_64_sync_handler+0x120/0x12c\n[T15862]  el0t_64_sync+0x190/0x194\n[T15862]\n[T15862] Freed by task 6192:\n[T15862]  kasan_save_stack+0x3c/0x70\n[T15862]  kasan_save_track+0x20/0x3c\n[T15862]  kasan_save_free_info+0x4c/0x80\n[T15862]  poison_slab_object+0x110/0x160\n[T15862]  __kasan_slab_free+0x3c/0x74\n[T15862]  kfree+0x134/0x3c0\n[T15862]  taprio_free_sched_cb+0x18c/0x220\n[T15862]  rcu_core+0x920/0x1b7c\n[T15862]  rcu_core_si+0x10/0x1c\n[T15862]  handle_softirqs+0x2e8/0xd64\n[T15862]  __do_softirq+0x14/0x20",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2522"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.8,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2024-50126"
		},
		{
			"cve":"CVE-2024-50127",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nnet: sched: fix use-after-free in taprio_change()\n\nIn 'taprio_change()', 'admin' pointer may become dangling due to sched\nswitch / removal caused by 'advance_sched()', and critical section\nprotected by 'q->current_entry_lock' is too small to prevent from such\na scenario (which causes use-after-free detected by KASAN). Fix this\nby prefer 'rcu_replace_pointer()' over 'rcu_assign_pointer()' to update\n'admin' immediately before an attempt to schedule freeing.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2522"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.8,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2024-50127"
		},
		{
			"cve":"CVE-2024-50128",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nnet: wwan: fix global oob in wwan_rtnl_policy\n\nThe variable wwan_rtnl_link_ops assign a *bigger* maxtype which leads to\na global out-of-bounds read when parsing the netlink attributes. Exactly\nsame bug cause as the oob fixed in commit b33fb5b801c6 (\"net: qualcomm:\nrmnet: fix global oob in rmnet_policy\").\n\n==================================================================\nBUG: KASAN: global-out-of-bounds in validate_nla lib/nlattr.c:388 [inline]\nBUG: KASAN: global-out-of-bounds in __nla_validate_parse+0x19d7/0x29a0 lib/nlattr.c:603\nRead of size 1 at addr ffffffff8b09cb60 by task syz.1.66276/323862\n\nCPU: 0 PID: 323862 Comm: syz.1.66276 Not tainted 6.1.70 #1\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.13.0-1ubuntu1.1 04/01/2014\nCall Trace:\n <TASK>\n __dump_stack lib/dump_stack.c:88 [inline]\n dump_stack_lvl+0x177/0x231 lib/dump_stack.c:106\n print_address_description mm/kasan/report.c:284 [inline]\n print_report+0x14f/0x750 mm/kasan/report.c:395\n kasan_report+0x139/0x170 mm/kasan/report.c:495\n validate_nla lib/nlattr.c:388 [inline]\n __nla_validate_parse+0x19d7/0x29a0 lib/nlattr.c:603\n __nla_parse+0x3c/0x50 lib/nlattr.c:700\n nla_parse_nested_deprecated include/net/netlink.h:1269 [inline]\n __rtnl_newlink net/core/rtnetlink.c:3514 [inline]\n rtnl_newlink+0x7bc/0x1fd0 net/core/rtnetlink.c:3623\n rtnetlink_rcv_msg+0x794/0xef0 net/core/rtnetlink.c:6122\n netlink_rcv_skb+0x1de/0x420 net/netlink/af_netlink.c:2508\n netlink_unicast_kernel net/netlink/af_netlink.c:1326 [inline]\n netlink_unicast+0x74b/0x8c0 net/netlink/af_netlink.c:1352\n netlink_sendmsg+0x882/0xb90 net/netlink/af_netlink.c:1874\n sock_sendmsg_nosec net/socket.c:716 [inline]\n __sock_sendmsg net/socket.c:728 [inline]\n ____sys_sendmsg+0x5cc/0x8f0 net/socket.c:2499\n ___sys_sendmsg+0x21c/0x290 net/socket.c:2553\n __sys_sendmsg net/socket.c:2582 [inline]\n __do_sys_sendmsg net/socket.c:2591 [inline]\n __se_sys_sendmsg+0x19e/0x270 net/socket.c:2589\n do_syscall_x64 arch/x86/entry/common.c:51 [inline]\n do_syscall_64+0x45/0x90 arch/x86/entry/common.c:81\n entry_SYSCALL_64_after_hwframe+0x63/0xcd\nRIP: 0033:0x7f67b19a24ad\nRSP: 002b:00007f67b17febb8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e\nRAX: ffffffffffffffda RBX: 00007f67b1b45f80 RCX: 00007f67b19a24ad\nRDX: 0000000000000000 RSI: 0000000020005e40 RDI: 0000000000000004\nRBP: 00007f67b1a1e01d R08: 0000000000000000 R09: 0000000000000000\nR10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000\nR13: 00007ffd2513764f R14: 00007ffd251376e0 R15: 00007f67b17fed40\n </TASK>\n\nThe buggy address belongs to the variable:\n wwan_rtnl_policy+0x20/0x40\n\nThe buggy address belongs to the physical page:\npage:ffffea00002c2700 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xb09c\nflags: 0xfff00000001000(reserved|node=0|zone=1|lastcpupid=0x7ff)\nraw: 00fff00000001000 ffffea00002c2708 ffffea00002c2708 0000000000000000\nraw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000\npage dumped because: kasan: bad access detected\npage_owner info is not present (never set?)\n\nMemory state around the buggy address:\n ffffffff8b09ca00: 05 f9 f9 f9 05 f9 f9 f9 00 01 f9 f9 00 01 f9 f9\n ffffffff8b09ca80: 00 00 00 05 f9 f9 f9 f9 00 00 03 f9 f9 f9 f9 f9\n>ffffffff8b09cb00: 00 00 00 00 05 f9 f9 f9 00 00 00 00 f9 f9 f9 f9\n                                                       ^\n ffffffff8b09cb80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00\n==================================================================\n\nAccording to the comment of `nla_parse_nested_deprecated`, use correct size\n`IFLA_WWAN_MAX` here to fix this issue.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2522"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.1,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2024-50128"
		},
		{
			"cve":"CVE-2024-50130",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: bpf: must hold reference on net namespace\n\nBUG: KASAN: slab-use-after-free in __nf_unregister_net_hook+0x640/0x6b0\nRead of size 8 at addr ffff8880106fe400 by task repro/72=\nbpf_nf_link_release+0xda/0x1e0\nbpf_link_free+0x139/0x2d0\nbpf_link_release+0x68/0x80\n__fput+0x414/0xb60\n\nEric says:\n It seems that bpf was able to defer the __nf_unregister_net_hook()\n after exit()/close() time.\n Perhaps a netns reference is missing, because the netns has been\n dismantled/freed already.\n bpf_nf_link_attach() does :\n link->net = net;\n But I do not see a reference being taken on net.\n\nAdd such a reference and release it after hook unreg.\nNote that I was unable to get syzbot reproducer to work, so I\ndo not know if this resolves this splat.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2522"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.8,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2024-50130"
		},
		{
			"cve":"CVE-2024-50135",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nnvme-pci: fix race condition between reset and nvme_dev_disable()\n\nnvme_dev_disable() modifies the dev->online_queues field, therefore\nnvme_pci_update_nr_queues() should avoid racing against it, otherwise\nwe could end up passing invalid values to blk_mq_update_nr_hw_queues().\n\n WARNING: CPU: 39 PID: 61303 at drivers/pci/msi/api.c:347\n          pci_irq_get_affinity+0x187/0x210\n Workqueue: nvme-reset-wq nvme_reset_work [nvme]\n RIP: 0010:pci_irq_get_affinity+0x187/0x210\n Call Trace:\n  <TASK>\n  ? blk_mq_pci_map_queues+0x87/0x3c0\n  ? pci_irq_get_affinity+0x187/0x210\n  blk_mq_pci_map_queues+0x87/0x3c0\n  nvme_pci_map_queues+0x189/0x460 [nvme]\n  blk_mq_update_nr_hw_queues+0x2a/0x40\n  nvme_reset_work+0x1be/0x2a0 [nvme]\n\nFix the bug by locking the shutdown_lock mutex before using\ndev->online_queues. Give up if nvme_dev_disable() is running or if\nit has been executed already.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2522"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":4.7,
						"vectorString":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-50135"
		},
		{
			"cve":"CVE-2024-50137",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nreset: starfive: jh71x0: Fix accessing the empty member on JH7110 SoC\n\ndata->asserted will be NULL on JH7110 SoC since commit 82327b127d41\n(\"reset: starfive: Add StarFive JH7110 reset driver\") was added. Add\nthe judgment condition to avoid errors when calling reset_control_status\non JH7110 SoC.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2522"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-50137"
		},
		{
			"cve":"CVE-2024-50139",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nKVM: arm64: Fix shift-out-of-bounds bug\n\nFix a shift-out-of-bounds bug reported by UBSAN when running\nVM with MTE enabled host kernel.\n\nUBSAN: shift-out-of-bounds in arch/arm64/kvm/sys_regs.c:1988:14\nshift exponent 33 is too large for 32-bit type 'int'\nCPU: 26 UID: 0 PID: 7629 Comm: qemu-kvm Not tainted 6.12.0-rc2 #34\nHardware name: IEI NF5280R7/Mitchell MB, BIOS 00.00. 2024-10-12 09:28:54 10/14/2024\nCall trace:\n dump_backtrace+0xa0/0x128\n show_stack+0x20/0x38\n dump_stack_lvl+0x74/0x90\n dump_stack+0x18/0x28\n __ubsan_handle_shift_out_of_bounds+0xf8/0x1e0\n reset_clidr+0x10c/0x1c8\n kvm_reset_sys_regs+0x50/0x1c8\n kvm_reset_vcpu+0xec/0x2b0\n __kvm_vcpu_set_target+0x84/0x158\n kvm_vcpu_set_target+0x138/0x168\n kvm_arch_vcpu_ioctl_vcpu_init+0x40/0x2b0\n kvm_arch_vcpu_ioctl+0x28c/0x4b8\n kvm_vcpu_ioctl+0x4bc/0x7a8\n __arm64_sys_ioctl+0xb4/0x100\n invoke_syscall+0x70/0x100\n el0_svc_common.constprop.0+0x48/0xf0\n do_el0_svc+0x24/0x38\n el0_svc+0x3c/0x158\n el0t_64_sync_handler+0x120/0x130\n el0t_64_sync+0x194/0x198",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2522"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-50139"
		},
		{
			"cve":"CVE-2024-50150",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nusb: typec: altmode should keep reference to parent\n\nThe altmode device release refers to its parent device, but without keeping\na reference to it.\n\nWhen registering the altmode, get a reference to the parent and put it in\nthe release function.\n\nBefore this fix, when using CONFIG_DEBUG_KOBJECT_RELEASE, we see issues\nlike this:\n\n[   43.572860] kobject: 'port0.0' (ffff8880057ba008): kobject_release, parent 0000000000000000 (delayed 3000)\n[   43.573532] kobject: 'port0.1' (ffff8880057bd008): kobject_release, parent 0000000000000000 (delayed 1000)\n[   43.574407] kobject: 'port0' (ffff8880057b9008): kobject_release, parent 0000000000000000 (delayed 3000)\n[   43.575059] kobject: 'port1.0' (ffff8880057ca008): kobject_release, parent 0000000000000000 (delayed 4000)\n[   43.575908] kobject: 'port1.1' (ffff8880057c9008): kobject_release, parent 0000000000000000 (delayed 4000)\n[   43.576908] kobject: 'typec' (ffff8880062dbc00): kobject_release, parent 0000000000000000 (delayed 4000)\n[   43.577769] kobject: 'port1' (ffff8880057bf008): kobject_release, parent 0000000000000000 (delayed 3000)\n[   46.612867] ==================================================================\n[   46.613402] BUG: KASAN: slab-use-after-free in typec_altmode_release+0x38/0x129\n[   46.614003] Read of size 8 at addr ffff8880057b9118 by task kworker/2:1/48\n[   46.614538]\n[   46.614668] CPU: 2 UID: 0 PID: 48 Comm: kworker/2:1 Not tainted 6.12.0-rc1-00138-gedbae730ad31 #535\n[   46.615391] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.15.0-1 04/01/2014\n[   46.616042] Workqueue: events kobject_delayed_cleanup\n[   46.616446] Call Trace:\n[   46.616648]  <TASK>\n[   46.616820]  dump_stack_lvl+0x5b/0x7c\n[   46.617112]  ? typec_altmode_release+0x38/0x129\n[   46.617470]  print_report+0x14c/0x49e\n[   46.617769]  ? rcu_read_unlock_sched+0x56/0x69\n[   46.618117]  ? __virt_addr_valid+0x19a/0x1ab\n[   46.618456]  ? kmem_cache_debug_flags+0xc/0x1d\n[   46.618807]  ? typec_altmode_release+0x38/0x129\n[   46.619161]  kasan_report+0x8d/0xb4\n[   46.619447]  ? typec_altmode_release+0x38/0x129\n[   46.619809]  ? process_scheduled_works+0x3cb/0x85f\n[   46.620185]  typec_altmode_release+0x38/0x129\n[   46.620537]  ? process_scheduled_works+0x3cb/0x85f\n[   46.620907]  device_release+0xaf/0xf2\n[   46.621206]  kobject_delayed_cleanup+0x13b/0x17a\n[   46.621584]  process_scheduled_works+0x4f6/0x85f\n[   46.621955]  ? __pfx_process_scheduled_works+0x10/0x10\n[   46.622353]  ? hlock_class+0x31/0x9a\n[   46.622647]  ? lock_acquired+0x361/0x3c3\n[   46.622956]  ? move_linked_works+0x46/0x7d\n[   46.623277]  worker_thread+0x1ce/0x291\n[   46.623582]  ? __kthread_parkme+0xc8/0xdf\n[   46.623900]  ? __pfx_worker_thread+0x10/0x10\n[   46.624236]  kthread+0x17e/0x190\n[   46.624501]  ? kthread+0xfb/0x190\n[   46.624756]  ? __pfx_kthread+0x10/0x10\n[   46.625015]  ret_from_fork+0x20/0x40\n[   46.625268]  ? __pfx_kthread+0x10/0x10\n[   46.625532]  ret_from_fork_asm+0x1a/0x30\n[   46.625805]  </TASK>\n[   46.625953]\n[   46.626056] Allocated by task 678:\n[   46.626287]  kasan_save_stack+0x24/0x44\n[   46.626555]  kasan_save_track+0x14/0x2d\n[   46.626811]  __kasan_kmalloc+0x3f/0x4d\n[   46.627049]  __kmalloc_noprof+0x1bf/0x1f0\n[   46.627362]  typec_register_port+0x23/0x491\n[   46.627698]  cros_typec_probe+0x634/0xbb6\n[   46.628026]  platform_probe+0x47/0x8c\n[   46.628311]  really_probe+0x20a/0x47d\n[   46.628605]  device_driver_attach+0x39/0x72\n[   46.628940]  bind_store+0x87/0xd7\n[   46.629213]  kernfs_fop_write_iter+0x1aa/0x218\n[   46.629574]  vfs_write+0x1d6/0x29b\n[   46.629856]  ksys_write+0xcd/0x13b\n[   46.630128]  do_syscall_64+0xd4/0x139\n[   46.630420]  entry_SYSCALL_64_after_hwframe+0x76/0x7e\n[   46.630820]\n[   46.630946] Freed by task 48:\n[   46.631182]  kasan_save_stack+0x24/0x44\n[   46.631493]  kasan_save_track+0x14/0x2d\n[   46.631799]  kasan_save_free_info+0x3f/0x4d\n[   46.632144]  __kasan_slab_free+0x37/0x45\n[   46.632474]\n---truncated---",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2522"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.8,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2024-50150"
		},
		{
			"cve":"CVE-2024-50155",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nnetdevsim: use cond_resched() in nsim_dev_trap_report_work()\n\nI am still seeing many syzbot reports hinting that syzbot\nmight fool nsim_dev_trap_report_work() with hundreds of ports [1]\n\nLets use cond_resched(), and system_unbound_wq\ninstead of implicit system_wq.\n\n[1]\nINFO: task syz-executor:20633 blocked for more than 143 seconds.\n      Not tainted 6.12.0-rc2-syzkaller-00205-g1d227fcc7222 #0\n\"echo 0 > /proc/sys/kernel/hung_task_timeout_secs\" disables this message.\ntask:syz-executor    state:D stack:25856 pid:20633 tgid:20633 ppid:1      flags:0x00004006\n...\nNMI backtrace for cpu 1\nCPU: 1 UID: 0 PID: 16760 Comm: kworker/1:0 Not tainted 6.12.0-rc2-syzkaller-00205-g1d227fcc7222 #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024\nWorkqueue: events nsim_dev_trap_report_work\n RIP: 0010:__sanitizer_cov_trace_pc+0x0/0x70 kernel/kcov.c:210\nCode: 89 fb e8 23 00 00 00 48 8b 3d 04 fb 9c 0c 48 89 de 5b e9 c3 c7 5d 00 0f 1f 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 <f3> 0f 1e fa 48 8b 04 24 65 48 8b 0c 25 c0 d7 03 00 65 8b 15 60 f0\nRSP: 0018:ffffc90000a187e8 EFLAGS: 00000246\nRAX: 0000000000000100 RBX: ffffc90000a188e0 RCX: ffff888027d3bc00\nRDX: ffff888027d3bc00 RSI: 0000000000000000 RDI: 0000000000000000\nRBP: ffff88804a2e6000 R08: ffffffff8a4bc495 R09: ffffffff89da3577\nR10: 0000000000000004 R11: ffffffff8a4bc2b0 R12: dffffc0000000000\nR13: ffff88806573b503 R14: dffffc0000000000 R15: ffff8880663cca00\nFS:  0000000000000000(0000) GS:ffff8880b8700000(0000) knlGS:0000000000000000\nCS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00007fc90a747f98 CR3: 000000000e734000 CR4: 00000000003526f0\nDR0: 0000000000000000 DR1: 000000000000002b DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400\nCall Trace:\n <NMI>\n </NMI>\n <TASK>\n  __local_bh_enable_ip+0x1bb/0x200 kernel/softirq.c:382\n  spin_unlock_bh include/linux/spinlock.h:396 [inline]\n  nsim_dev_trap_report drivers/net/netdevsim/dev.c:820 [inline]\n  nsim_dev_trap_report_work+0x75d/0xaa0 drivers/net/netdevsim/dev.c:850\n  process_one_work kernel/workqueue.c:3229 [inline]\n  process_scheduled_works+0xa63/0x1850 kernel/workqueue.c:3310\n  worker_thread+0x870/0xd30 kernel/workqueue.c:3391\n  kthread+0x2f0/0x390 kernel/kthread.c:389\n  ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:147\n  ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244\n </TASK>",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2522"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.8,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2024-50155"
		},
		{
			"cve":"CVE-2024-50158",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/bnxt_re: Fix out of bound check\n\nDriver exports pacing stats only on GenP5 and P7 adapters. But while\nparsing the pacing stats, driver has a check for \"rdev->dbr_pacing\".  This\ncaused a trace when KASAN is enabled.\n\nBUG: KASAN: slab-out-of-bounds in bnxt_re_get_hw_stats+0x2b6a/0x2e00 [bnxt_re]\nWrite of size 8 at addr ffff8885942a6340 by task modprobe/4809",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2522"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.8,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2024-50158"
		},
		{
			"cve":"CVE-2024-50163",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Make sure internal and UAPI bpf_redirect flags don't overlap\n\nThe bpf_redirect_info is shared between the SKB and XDP redirect paths,\nand the two paths use the same numeric flag values in the ri->flags\nfield (specifically, BPF_F_BROADCAST == BPF_F_NEXTHOP). This means that\nif skb bpf_redirect_neigh() is used with a non-NULL params argument and,\nsubsequently, an XDP redirect is performed using the same\nbpf_redirect_info struct, the XDP path will get confused and end up\ncrashing, which syzbot managed to trigger.\n\nWith the stack-allocated bpf_redirect_info, the structure is no longer\nshared between the SKB and XDP paths, so the crash doesn't happen\nanymore. However, different code paths using identically-numbered flag\nvalues in the same struct field still seems like a bit of a mess, so\nthis patch cleans that up by moving the flag definitions together and\nredefining the three flags in BPF_F_REDIRECT_INTERNAL to not overlap\nwith the flags used for XDP. It also adds a BUILD_BUG_ON() check to make\nsure the overlap is not re-introduced by mistake.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2522"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-50163"
		},
		{
			"cve":"CVE-2024-50164",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Fix overloading of MEM_UNINIT's meaning\n\nLonial reported an issue in the BPF verifier where check_mem_size_reg()\nhas the following code:\n\n    if (!tnum_is_const(reg->var_off))\n        /* For unprivileged variable accesses, disable raw\n         * mode so that the program is required to\n         * initialize all the memory that the helper could\n         * just partially fill up.\n         */\n         meta = NULL;\n\nThis means that writes are not checked when the register containing the\nsize of the passed buffer has not a fixed size. Through this bug, a BPF\nprogram can write to a map which is marked as read-only, for example,\n.rodata global maps.\n\nThe problem is that MEM_UNINIT's initial meaning that \"the passed buffer\nto the BPF helper does not need to be initialized\" which was added back\nin commit 435faee1aae9 (\"bpf, verifier: add ARG_PTR_TO_RAW_STACK type\")\ngot overloaded over time with \"the passed buffer is being written to\".\n\nThe problem however is that checks such as the above which were added later\nvia 06c1c049721a (\"bpf: allow helpers access to variable memory\") set meta\nto NULL in order force the user to always initialize the passed buffer to\nthe helper. Due to the current double meaning of MEM_UNINIT, this bypasses\nverifier write checks to the memory (not boundary checks though) and only\nassumes the latter memory is read instead.\n\nFix this by reverting MEM_UNINIT back to its original meaning, and having\nMEM_WRITE as an annotation to BPF helpers in order to then trigger the\nBPF verifier checks for writing to memory.\n\nSome notes: check_arg_pair_ok() ensures that for ARG_CONST_SIZE{,_OR_ZERO}\nwe can access fn->arg_type[arg - 1] since it must contain a preceding\nARG_PTR_TO_MEM. For check_mem_reg() the meta argument can be removed\naltogether since we do check both BPF_READ and BPF_WRITE. Same for the\nequivalent check_kfunc_mem_size_reg().",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2522"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.1,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2024-50164"
		},
		{
			"cve":"CVE-2024-50187",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/vc4: Stop the active perfmon before being destroyed\n\nUpon closing the file descriptor, the active performance monitor is not\nstopped. Although all perfmons are destroyed in `vc4_perfmon_close_file()`,\nthe active performance monitor's pointer (`vc4->active_perfmon`) is still\nretained.\n\nIf we open a new file descriptor and submit a few jobs with performance\nmonitors, the driver will attempt to stop the active performance monitor\nusing the stale pointer in `vc4->active_perfmon`. However, this pointer\nis no longer valid because the previous process has already terminated,\nand all performance monitors associated with it have been destroyed and\nfreed.\n\nTo fix this, when the active performance monitor belongs to a given\nprocess, explicitly stop it before destroying and freeing it.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2522"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-50187"
		},
		{
			"cve":"CVE-2024-50188",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nnet: phy: dp83869: fix memory corruption when enabling fiber\n\nWhen configuring the fiber port, the DP83869 PHY driver incorrectly\ncalls linkmode_set_bit() with a bit mask (1 << 10) rather than a bit\nnumber (10). This corrupts some other memory location -- in case of\narm64 the priv pointer in the same structure.\n\nSince the advertising flags are updated from supported at the end of the\nfunction the incorrect line isn't needed at all and can be removed.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2522"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-50188"
		},
		{
			"cve":"CVE-2024-50196",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\npinctrl: ocelot: fix system hang on level based interrupts\n\nThe current implementation only calls chained_irq_enter() and\nchained_irq_exit() if it detects pending interrupts.\n\n```\nfor (i = 0; i < info->stride; i++) {\n\turegmap_read(info->map, id_reg + 4 * i, &reg);\n\tif (!reg)\n\t\tcontinue;\n\n\tchained_irq_enter(parent_chip, desc);\n```\n\nHowever, in case of GPIO pin configured in level mode and the parent\ncontroller configured in edge mode, GPIO interrupt might be lowered by the\nhardware. In the result, if the interrupt is short enough, the parent\ninterrupt is still pending while the GPIO interrupt is cleared;\nchained_irq_enter() never gets called and the system hangs trying to\nservice the parent interrupt.\n\nMoving chained_irq_enter() and chained_irq_exit() outside the for loop\nensures that they are called even when GPIO interrupt is lowered by the\nhardware.\n\nThe similar code with chained_irq_enter() / chained_irq_exit() functions\nwrapping interrupt checking loop may be found in many other drivers:\n```\ngrep -r -A 10 chained_irq_enter drivers/pinctrl\n```",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2522"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-50196"
		},
		{
			"cve":"CVE-2024-50201",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/radeon: Fix encoder->possible_clones\n\nInclude the encoder itself in its possible_clones bitmask.\nIn the past nothing validated that drivers were populating\npossible_clones correctly, but that changed in commit\n74d2aacbe840 (\"drm: Validate encoder->possible_clones\").\nLooks like radeon never got the memo and is still not\nfollowing the rules 100% correctly.\n\nThis results in some warnings during driver initialization:\nBogus possible_clones: [ENCODER:46:TV-46] possible_clones=0x4 (full encoder mask=0x7)\nWARNING: CPU: 0 PID: 170 at drivers/gpu/drm/drm_mode_config.c:615 drm_mode_config_validate+0x113/0x39c\n...\n\n(cherry picked from commit 3b6e7d40649c0d75572039aff9d0911864c689db)",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2522"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-50201"
		},
		{
			"cve":"CVE-2024-50211",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nudf: refactor inode_bmap() to handle error\n\nRefactor inode_bmap() to handle error since udf_next_aext() can return\nerror now. On situations like ftruncate, udf_extend_file() can now\ndetect errors and bail out early without resorting to checking for\nparticular offsets and assuming internal behavior of these functions.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2522"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"LOW",
						"baseScore":3.3,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Low",
					"category":"impact"
				}
			],
			"title":"CVE-2024-50211"
		},
		{
			"cve":"CVE-2024-50218",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nocfs2: pass u64 to ocfs2_truncate_inline maybe overflow\n\nSyzbot reported a kernel BUG in ocfs2_truncate_inline.  There are two\nreasons for this: first, the parameter value passed is greater than\nocfs2_max_inline_data_with_xattr, second, the start and end parameters of\nocfs2_truncate_inline are \"unsigned int\".\n\nSo, we need to add a sanity check for byte_start and byte_len right before\nocfs2_truncate_inline() in ocfs2_remove_inode_range(), if they are greater\nthan ocfs2_max_inline_data_with_xattr return -EINVAL.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2522"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"LOW",
						"baseScore":3.9,
						"vectorString":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Low",
					"category":"impact"
				}
			],
			"title":"CVE-2024-50218"
		},
		{
			"cve":"CVE-2024-50222",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\niov_iter: fix copy_page_from_iter_atomic() if KMAP_LOCAL_FORCE_MAP\n\ngeneric/077 on x86_32 CONFIG_DEBUG_KMAP_LOCAL_FORCE_MAP=y with highmem,\non huge=always tmpfs, issues a warning and then hangs (interruptibly):\n\nWARNING: CPU: 5 PID: 3517 at mm/highmem.c:622 kunmap_local_indexed+0x62/0xc9\nCPU: 5 UID: 0 PID: 3517 Comm: cp Not tainted 6.12.0-rc4 #2\n...\ncopy_page_from_iter_atomic+0xa6/0x5ec\ngeneric_perform_write+0xf6/0x1b4\nshmem_file_write_iter+0x54/0x67\n\nFix copy_page_from_iter_atomic() by limiting it in that case\n(include/linux/skbuff.h skb_frag_must_loop() does similar).\n\nBut going forward, perhaps CONFIG_DEBUG_KMAP_LOCAL_FORCE_MAP is too\nsurprising, has outlived its usefulness, and should just be removed?",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2522"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.8,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2024-50222"
		},
		{
			"cve":"CVE-2024-50226",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\ncxl/port: Fix use-after-free, permit out-of-order decoder shutdown\n\nIn support of investigating an initialization failure report [1],\ncxl_test was updated to register mock memory-devices after the mock\nroot-port/bus device had been registered. That led to cxl_test crashing\nwith a use-after-free bug with the following signature:\n\n    cxl_port_attach_region: cxl region3: cxl_host_bridge.0:port3 decoder3.0 add: mem0:decoder7.0 @ 0 next: cxl_switch_uport.0 nr_eps: 1 nr_targets: 1\n    cxl_port_attach_region: cxl region3: cxl_host_bridge.0:port3 decoder3.0 add: mem4:decoder14.0 @ 1 next: cxl_switch_uport.0 nr_eps: 2 nr_targets: 1\n    cxl_port_setup_targets: cxl region3: cxl_switch_uport.0:port6 target[0] = cxl_switch_dport.0 for mem0:decoder7.0 @ 0\n1)  cxl_port_setup_targets: cxl region3: cxl_switch_uport.0:port6 target[1] = cxl_switch_dport.4 for mem4:decoder14.0 @ 1\n    [..]\n    cxld_unregister: cxl decoder14.0:\n    cxl_region_decode_reset: cxl_region region3:\n    mock_decoder_reset: cxl_port port3: decoder3.0 reset\n2)  mock_decoder_reset: cxl_port port3: decoder3.0: out of order reset, expected decoder3.1\n    cxl_endpoint_decoder_release: cxl decoder14.0:\n    [..]\n    cxld_unregister: cxl decoder7.0:\n3)  cxl_region_decode_reset: cxl_region region3:\n    Oops: general protection fault, probably for non-canonical address 0x6b6b6b6b6b6b6bc3: 0000 [#1] PREEMPT SMP PTI\n    [..]\n    RIP: 0010:to_cxl_port+0x8/0x60 [cxl_core]\n    [..]\n    Call Trace:\n     <TASK>\n     cxl_region_decode_reset+0x69/0x190 [cxl_core]\n     cxl_region_detach+0xe8/0x210 [cxl_core]\n     cxl_decoder_kill_region+0x27/0x40 [cxl_core]\n     cxld_unregister+0x5d/0x60 [cxl_core]\n\nAt 1) a region has been established with 2 endpoint decoders (7.0 and\n14.0). Those endpoints share a common switch-decoder in the topology\n(3.0). At teardown, 2), decoder14.0 is the first to be removed and hits\nthe \"out of order reset case\" in the switch decoder. The effect though\nis that region3 cleanup is aborted leaving it in-tact and\nreferencing decoder14.0. At 3) the second attempt to teardown region3\ntrips over the stale decoder14.0 object which has long since been\ndeleted.\n\nThe fix here is to recognize that the CXL specification places no\nmandate on in-order shutdown of switch-decoders, the driver enforces\nin-order allocation, and hardware enforces in-order commit. So, rather\nthan fail and leave objects dangling, always remove them.\n\nIn support of making cxl_region_decode_reset() always succeed,\ncxl_region_invalidate_memregion() failures are turned into warnings.\nCrashing the kernel is ok there since system integrity is at risk if\ncaches cannot be managed around physical address mutation events like\nCXL region destruction.\n\nA new device_for_each_child_reverse_from() is added to cleanup\nport->commit_end after all dependent decoders have been disabled. In\nother words if decoders are allocated 0->1->2 and disabled 1->2->0 then\nport->commit_end only decrements from 2 after 2 has been disabled, and\nit decrements all the way to zero since 1 was disabled previously.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2522"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.8,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2024-50226"
		},
		{
			"cve":"CVE-2024-50229",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nnilfs2: fix potential deadlock with newly created symlinks\n\nSyzbot reported that page_symlink(), called by nilfs_symlink(), triggers\nmemory reclamation involving the filesystem layer, which can result in\ncircular lock dependencies among the reader/writer semaphore\nnilfs->ns_segctor_sem, s_writers percpu_rwsem (intwrite) and the\nfs_reclaim pseudo lock.\n\nThis is because after commit 21fc61c73c39 (\"don't put symlink bodies in\npagecache into highmem\"), the gfp flags of the page cache for symbolic\nlinks are overwritten to GFP_KERNEL via inode_nohighmem().\n\nThis is not a problem for symlinks read from the backing device, because\nthe __GFP_FS flag is dropped after inode_nohighmem() is called.  However,\nwhen a new symlink is created with nilfs_symlink(), the gfp flags remain\noverwritten to GFP_KERNEL.  Then, memory allocation called from\npage_symlink() etc.  triggers memory reclamation including the FS layer,\nwhich may call nilfs_evict_inode() or nilfs_dirty_inode().  And these can\ncause a deadlock if they are called while nilfs->ns_segctor_sem is held:\n\nFix this issue by dropping the __GFP_FS flag from the page cache GFP flags\nof newly created symlinks in the same way that nilfs_new_inode() and\n__nilfs_read_inode() do, as a workaround until we adopt nofs allocation\nscope consistently or improve the locking constraints.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2522"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-50229"
		},
		{
			"cve":"CVE-2024-50235",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: cfg80211: clear wdev->cqm_config pointer on free\n\nWhen we free wdev->cqm_config when unregistering, we also\nneed to clear out the pointer since the same wdev/netdev\nmay get re-registered in another network namespace, then\ndestroyed later, running this code again, which results in\na double-free.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2522"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.8,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2024-50235"
		},
		{
			"cve":"CVE-2024-50259",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nnetdevsim: Add trailing zero to terminate the string in nsim_nexthop_bucket_activity_write()\n\nThis was found by a static analyzer.\nWe should not forget the trailing zero after copy_from_user()\nif we will further do some string operations, sscanf() in this\ncase. Adding a trailing zero will ensure that the function\nperforms properly.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2522"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-50259"
		},
		{
			"cve":"CVE-2024-50261",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nmacsec: Fix use-after-free while sending the offloading packet\n\nKASAN reports the following UAF. The metadata_dst, which is used to\nstore the SCI value for macsec offload, is already freed by\nmetadata_dst_free() in macsec_free_netdev(), while driver still use it\nfor sending the packet.\n\nTo fix this issue, dst_release() is used instead to release\nmetadata_dst. So it is not freed instantly in macsec_free_netdev() if\nstill referenced by skb.\n\n BUG: KASAN: slab-use-after-free in mlx5e_xmit+0x1e8f/0x4190 [mlx5_core]\n Read of size 2 at addr ffff88813e42e038 by task kworker/7:2/714\n [...]\n Workqueue: mld mld_ifc_work\n Call Trace:\n  <TASK>\n  dump_stack_lvl+0x51/0x60\n  print_report+0xc1/0x600\n  kasan_report+0xab/0xe0\n  mlx5e_xmit+0x1e8f/0x4190 [mlx5_core]\n  dev_hard_start_xmit+0x120/0x530\n  sch_direct_xmit+0x149/0x11e0\n  __qdisc_run+0x3ad/0x1730\n  __dev_queue_xmit+0x1196/0x2ed0\n  vlan_dev_hard_start_xmit+0x32e/0x510 [8021q]\n  dev_hard_start_xmit+0x120/0x530\n  __dev_queue_xmit+0x14a7/0x2ed0\n  macsec_start_xmit+0x13e9/0x2340\n  dev_hard_start_xmit+0x120/0x530\n  __dev_queue_xmit+0x14a7/0x2ed0\n  ip6_finish_output2+0x923/0x1a70\n  ip6_finish_output+0x2d7/0x970\n  ip6_output+0x1ce/0x3a0\n  NF_HOOK.constprop.0+0x15f/0x190\n  mld_sendpack+0x59a/0xbd0\n  mld_ifc_work+0x48a/0xa80\n  process_one_work+0x5aa/0xe50\n  worker_thread+0x79c/0x1290\n  kthread+0x28f/0x350\n  ret_from_fork+0x2d/0x70\n  ret_from_fork_asm+0x11/0x20\n  </TASK>\n\n Allocated by task 3922:\n  kasan_save_stack+0x20/0x40\n  kasan_save_track+0x10/0x30\n  __kasan_kmalloc+0x77/0x90\n  __kmalloc_noprof+0x188/0x400\n  metadata_dst_alloc+0x1f/0x4e0\n  macsec_newlink+0x914/0x1410\n  __rtnl_newlink+0xe08/0x15b0\n  rtnl_newlink+0x5f/0x90\n  rtnetlink_rcv_msg+0x667/0xa80\n  netlink_rcv_skb+0x12c/0x360\n  netlink_unicast+0x551/0x770\n  netlink_sendmsg+0x72d/0xbd0\n  __sock_sendmsg+0xc5/0x190\n  ____sys_sendmsg+0x52e/0x6a0\n  ___sys_sendmsg+0xeb/0x170\n  __sys_sendmsg+0xb5/0x140\n  do_syscall_64+0x4c/0x100\n  entry_SYSCALL_64_after_hwframe+0x4b/0x53\n\n Freed by task 4011:\n  kasan_save_stack+0x20/0x40\n  kasan_save_track+0x10/0x30\n  kasan_save_free_info+0x37/0x50\n  poison_slab_object+0x10c/0x190\n  __kasan_slab_free+0x11/0x30\n  kfree+0xe0/0x290\n  macsec_free_netdev+0x3f/0x140\n  netdev_run_todo+0x450/0xc70\n  rtnetlink_rcv_msg+0x66f/0xa80\n  netlink_rcv_skb+0x12c/0x360\n  netlink_unicast+0x551/0x770\n  netlink_sendmsg+0x72d/0xbd0\n  __sock_sendmsg+0xc5/0x190\n  ____sys_sendmsg+0x52e/0x6a0\n  ___sys_sendmsg+0xeb/0x170\n  __sys_sendmsg+0xb5/0x140\n  do_syscall_64+0x4c/0x100\n  entry_SYSCALL_64_after_hwframe+0x4b/0x53",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2522"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.8,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2024-50261"
		},
		{
			"cve":"CVE-2024-50264",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nvsock/virtio: Initialization of the dangling pointer occurring in vsk->trans\n\nDuring loopback communication, a dangling pointer can be created in\nvsk->trans, potentially leading to a Use-After-Free condition.  This\nissue is resolved by initializing vsk->trans to NULL.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2522"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.8,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2024-50264"
		},
		{
			"cve":"CVE-2024-50278",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\ndm cache: fix potential out-of-bounds access on the first resume\n\nOut-of-bounds access occurs if the fast device is expanded unexpectedly\nbefore the first-time resume of the cache table. This happens because\nexpanding the fast device requires reloading the cache table for\ncache_create to allocate new in-core data structures that fit the new\nsize, and the check in cache_preresume is not performed during the\nfirst resume, leading to the issue.\n\nReproduce steps:\n\n1. prepare component devices:\n\ndmsetup create cmeta --table \"0 8192 linear /dev/sdc 0\"\ndmsetup create cdata --table \"0 65536 linear /dev/sdc 8192\"\ndmsetup create corig --table \"0 524288 linear /dev/sdc 262144\"\ndd if=/dev/zero of=/dev/mapper/cmeta bs=4k count=1 oflag=direct\n\n2. load a cache table of 512 cache blocks, and deliberately expand the\n   fast device before resuming the cache, making the in-core data\n   structures inadequate.\n\ndmsetup create cache --notable\ndmsetup reload cache --table \"0 524288 cache /dev/mapper/cmeta \\\n/dev/mapper/cdata /dev/mapper/corig 128 2 metadata2 writethrough smq 0\"\ndmsetup reload cdata --table \"0 131072 linear /dev/sdc 8192\"\ndmsetup resume cdata\ndmsetup resume cache\n\n3. suspend the cache to write out the in-core dirty bitset and hint\n   array, leading to out-of-bounds access to the dirty bitset at offset\n   0x40:\n\ndmsetup suspend cache\n\nKASAN reports:\n\n  BUG: KASAN: vmalloc-out-of-bounds in is_dirty_callback+0x2b/0x80\n  Read of size 8 at addr ffffc90000085040 by task dmsetup/90\n\n  (...snip...)\n  The buggy address belongs to the virtual mapping at\n   [ffffc90000085000, ffffc90000087000) created by:\n   cache_ctr+0x176a/0x35f0\n\n  (...snip...)\n  Memory state around the buggy address:\n   ffffc90000084f00: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8\n   ffffc90000084f80: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8\n  >ffffc90000085000: 00 00 00 00 00 00 00 00 f8 f8 f8 f8 f8 f8 f8 f8\n                                             ^\n   ffffc90000085080: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8\n   ffffc90000085100: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8\n\nFix by checking the size change on the first resume.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2522"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.1,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2024-50278"
		},
		{
			"cve":"CVE-2024-50282",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amdgpu: add missing size check in amdgpu_debugfs_gprwave_read()\n\nAvoid a possible buffer overflow if size is larger than 4K.\n\n(cherry picked from commit f5d873f5825b40d886d03bd2aede91d4cf002434)",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2522"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.8,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2024-50282"
		},
		{
			"cve":"CVE-2024-50285",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nksmbd: check outstanding simultaneous SMB operations\n\nIf Client send simultaneous SMB operations to ksmbd, It exhausts too much\nmemory through the \"ksmbd_work_cache”. It will cause OOM issue.\nksmbd has a credit mechanism but it can't handle this problem. This patch\nadd the check if it exceeds max credits to prevent this problem by assuming\nthat one smb request consumes at least one credit.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2522"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-50285"
		},
		{
			"cve":"CVE-2024-50286",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nksmbd: fix slab-use-after-free in ksmbd_smb2_session_create\n\nThere is a race condition between ksmbd_smb2_session_create and\nksmbd_expire_session. This patch add missing sessions_table_lock\nwhile adding/deleting session from global session table.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2522"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.0,
						"vectorString":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2024-50286"
		},
		{
			"cve":"CVE-2024-50300",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nregulator: rtq2208: Fix uninitialized use of regulator_config\n\nFix rtq2208 driver uninitialized use to cause kernel error.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2522"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-50300"
		},
		{
			"cve":"CVE-2024-53042",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nipv4: ip_tunnel: Fix suspicious RCU usage warning in ip_tunnel_init_flow()\n\nThere are code paths from which the function is called without holding\nthe RCU read lock, resulting in a suspicious RCU usage warning [1].\n\nFix by using l3mdev_master_upper_ifindex_by_index() which will acquire\nthe RCU read lock before calling\nl3mdev_master_upper_ifindex_by_index_rcu().\n\n[1]\nWARNING: suspicious RCU usage\n6.12.0-rc3-custom-gac8f72681cf2 #141 Not tainted\n-----------------------------\nnet/core/dev.c:876 RCU-list traversed in non-reader section!!\n\nother info that might help us debug this:\n\nrcu_scheduler_active = 2, debug_locks = 1\n1 lock held by ip/361:\n #0: ffffffff86fc7cb0 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x377/0xf60\n\nstack backtrace:\nCPU: 3 UID: 0 PID: 361 Comm: ip Not tainted 6.12.0-rc3-custom-gac8f72681cf2 #141\nHardware name: Bochs Bochs, BIOS Bochs 01/01/2011\nCall Trace:\n <TASK>\n dump_stack_lvl+0xba/0x110\n lockdep_rcu_suspicious.cold+0x4f/0xd6\n dev_get_by_index_rcu+0x1d3/0x210\n l3mdev_master_upper_ifindex_by_index_rcu+0x2b/0xf0\n ip_tunnel_bind_dev+0x72f/0xa00\n ip_tunnel_newlink+0x368/0x7a0\n ipgre_newlink+0x14c/0x170\n __rtnl_newlink+0x1173/0x19c0\n rtnl_newlink+0x6c/0xa0\n rtnetlink_rcv_msg+0x3cc/0xf60\n netlink_rcv_skb+0x171/0x450\n netlink_unicast+0x539/0x7f0\n netlink_sendmsg+0x8c1/0xd80\n ____sys_sendmsg+0x8f9/0xc20\n ___sys_sendmsg+0x197/0x1e0\n __sys_sendmsg+0x122/0x1f0\n do_syscall_64+0xbb/0x1d0\n entry_SYSCALL_64_after_hwframe+0x77/0x7f",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2522"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-53042"
		},
		{
			"cve":"CVE-2024-53059",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: iwlwifi: mvm: Fix response handling in iwl_mvm_send_recovery_cmd()\n\n1. The size of the response packet is not validated.\n2. The response buffer is not freed.\n\nResolve these issues by switching to iwl_mvm_send_cmd_status(),\nwhich handles both size validation and frees the buffer.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2522"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.8,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2024-53059"
		},
		{
			"cve":"CVE-2024-53060",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amdgpu: prevent NULL pointer dereference if ATIF is not supported\n\nacpi_evaluate_object() may return AE_NOT_FOUND (failure), which\nwould result in dereferencing buffer.pointer (obj) while being NULL.\n\nAlthough this case may be unrealistic for the current code, it is\nstill better to protect against possible bugs.\n\nBail out also when status is AE_NOT_FOUND.\n\nThis fixes 1 FORWARD_NULL issue reported by Coverity\nReport: CID 1600951:  Null pointer dereferences  (FORWARD_NULL)\n\n(cherry picked from commit 91c9e221fe2553edf2db71627d8453f083de87a1)",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2522"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-53060"
		},
		{
			"cve":"CVE-2024-53073",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nNFSD: Never decrement pending_async_copies on error\n\nThe error flow in nfsd4_copy() calls cleanup_async_copy(), which\nalready decrements nn->pending_async_copies.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2522"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-53073"
		},
		{
			"cve":"CVE-2024-53090",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nafs: Fix lock recursion\n\nafs_wake_up_async_call() can incur lock recursion.  The problem is that it\nis called from AF_RXRPC whilst holding the ->notify_lock, but it tries to\ntake a ref on the afs_call struct in order to pass it to a work queue - but\nif the afs_call is already queued, we then have an extraneous ref that must\nbe put... calling afs_put_call() may call back down into AF_RXRPC through\nrxrpc_kernel_shutdown_call(), however, which might try taking the\n->notify_lock again.\n\nThis case isn't very common, however, so defer it to a workqueue.  The oops\nlooks something like:\n\n  BUG: spinlock recursion on CPU#0, krxrpcio/7001/1646\n   lock: 0xffff888141399b30, .magic: dead4ead, .owner: krxrpcio/7001/1646, .owner_cpu: 0\n  CPU: 0 UID: 0 PID: 1646 Comm: krxrpcio/7001 Not tainted 6.12.0-rc2-build3+ #4351\n  Hardware name: ASUS All Series/H97-PLUS, BIOS 2306 10/09/2014\n  Call Trace:\n   <TASK>\n   dump_stack_lvl+0x47/0x70\n   do_raw_spin_lock+0x3c/0x90\n   rxrpc_kernel_shutdown_call+0x83/0xb0\n   afs_put_call+0xd7/0x180\n   rxrpc_notify_socket+0xa0/0x190\n   rxrpc_input_split_jumbo+0x198/0x1d0\n   rxrpc_input_data+0x14b/0x1e0\n   ? rxrpc_input_call_packet+0xc2/0x1f0\n   rxrpc_input_call_event+0xad/0x6b0\n   rxrpc_input_packet_on_conn+0x1e1/0x210\n   rxrpc_input_packet+0x3f2/0x4d0\n   rxrpc_io_thread+0x243/0x410\n   ? __pfx_rxrpc_io_thread+0x10/0x10\n   kthread+0xcf/0xe0\n   ? __pfx_kthread+0x10/0x10\n   ret_from_fork+0x24/0x40\n   ? __pfx_kthread+0x10/0x10\n   ret_from_fork_asm+0x1a/0x30\n   </TASK>",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2522"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-61.0.0.60.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-61.0.0.60.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-53090"
		}
	]
}