{
	"document":{
		"aggregate_severity":{
			"namespace":"https://nvd.nist.gov/vuln-metrics/cvss",
			"text":"High"
		},
		"category":"csaf_vex",
		"csaf_version":"2.0",
		"distribution":{
			"tlp":{
				"label":"WHITE",
				"url":"https:/www.first.org/tlp/"
			}
		},
		"lang":"en",
		"notes":[
			{
				"text":"kernel security update",
				"category":"general",
				"title":"Synopsis"
			},
			{
				"text":"An update for kernel is now available for openEuler-24.03-LTS",
				"category":"general",
				"title":"Summary"
			},
			{
				"text":"The Linux Kernel, the operating system core itself.\n\nSecurity Fix(es):\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\naf_unix: Update unix_sk(sk)->oob_skb under sk_receive_queue lock.\n\nBilly Jheng Bing-Jhong reported a race between __unix_gc() and\nqueue_oob().\n\n__unix_gc() tries to garbage-collect close()d inflight sockets,\nand then if the socket has MSG_OOB in unix_sk(sk)->oob_skb, GC\nwill drop the reference and set NULL to it locklessly.\n\nHowever, the peer socket still can send MSG_OOB message and\nqueue_oob() can update unix_sk(sk)->oob_skb concurrently, leading\nNULL pointer dereference. [0]\n\nTo fix the issue, let's update unix_sk(sk)->oob_skb under the\nsk_receive_queue's lock and take it everywhere we touch oob_skb.\n\nNote that we defer kfree_skb() in manage_oob() to silence lockdep\nfalse-positive (See [1]).\n\n[0]:\nBUG: kernel NULL pointer dereference, address: 0000000000000008\n PF: supervisor write access in kernel mode\n PF: error_code(0x0002) - not-present page\nPGD 8000000009f5e067 P4D 8000000009f5e067 PUD 9f5d067 PMD 0\nOops: 0002 [#1] PREEMPT SMP PTI\nCPU: 3 PID: 50 Comm: kworker/3:1 Not tainted 6.9.0-rc5-00191-gd091e579b864 #110\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.0-0-gd239552ce722-prebuilt.qemu.org 04/01/2014\nWorkqueue: events delayed_fput\nRIP: 0010:skb_dequeue (./include/linux/skbuff.h:2386 ./include/linux/skbuff.h:2402 net/core/skbuff.c:3847)\nCode: 39 e3 74 3e 8b 43 10 48 89 ef 83 e8 01 89 43 10 49 8b 44 24 08 49 c7 44 24 08 00 00 00 00 49 8b 14 24 49 c7 04 24 00 00 00 00 <48> 89 42 08 48 89 10 e8 e7 c5 42 00 4c 89 e0 5b 5d 41 5c c3 cc cc\nRSP: 0018:ffffc900001bfd48 EFLAGS: 00000002\nRAX: 0000000000000000 RBX: ffff8880088f5ae8 RCX: 00000000361289f9\nRDX: 0000000000000000 RSI: 0000000000000206 RDI: ffff8880088f5b00\nRBP: ffff8880088f5b00 R08: 0000000000080000 R09: 0000000000000001\nR10: 0000000000000003 R11: 0000000000000001 R12: ffff8880056b6a00\nR13: ffff8880088f5280 R14: 0000000000000001 R15: ffff8880088f5a80\nFS:  0000000000000000(0000) GS:ffff88807dd80000(0000) knlGS:0000000000000000\nCS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000000000000008 CR3: 0000000006314000 CR4: 00000000007506f0\nPKRU: 55555554\nCall Trace:\n <TASK>\n unix_release_sock (net/unix/af_unix.c:654)\n unix_release (net/unix/af_unix.c:1050)\n __sock_release (net/socket.c:660)\n sock_close (net/socket.c:1423)\n __fput (fs/file_table.c:423)\n delayed_fput (fs/file_table.c:444 (discriminator 3))\n process_one_work (kernel/workqueue.c:3259)\n worker_thread (kernel/workqueue.c:3329 kernel/workqueue.c:3416)\n kthread (kernel/kthread.c:388)\n ret_from_fork (arch/x86/kernel/process.c:153)\n ret_from_fork_asm (arch/x86/entry/entry_64.S:257)\n </TASK>\nModules linked in:\nCR2: 0000000000000008(CVE-2024-36972)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nnet: do not leave a dangling sk pointer, when socket creation fails\n\nIt is possible to trigger a use-after-free by:\n  * attaching an fentry probe to __sock_release() and the probe calling the\n    bpf_get_socket_cookie() helper\n  * running traceroute -I 1.1.1.1 on a freshly booted VM\n\nA KASAN enabled kernel will log something like below (decoded and stripped):\n==================================================================\nBUG: KASAN: slab-use-after-free in __sock_gen_cookie (./arch/x86/include/asm/atomic64_64.h:15 ./include/linux/atomic/atomic-arch-fallback.h:2583 ./include/linux/atomic/atomic-instrumented.h:1611 net/core/sock_diag.c:29)\nRead of size 8 at addr ffff888007110dd8 by task traceroute/299\n\nCPU: 2 PID: 299 Comm: traceroute Tainted: G            E      6.10.0-rc2+ #2\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.2-debian-1.16.2-1 04/01/2014\nCall Trace:\n <TASK>\ndump_stack_lvl (lib/dump_stack.c:117 (discriminator 1))\nprint_report (mm/kasan/report.c:378 mm/kasan/report.c:488)\n? __sock_gen_cookie (./arch/x86/include/asm/atomic64_64.h:15 ./include/linux/atomic/atomic-arch-fallback.h:2583 ./include/linux/atomic/atomic-instrumented.h:1611 net/core/sock_diag.c:29)\nkasan_report (mm/kasan/report.c:603)\n? __sock_gen_cookie (./arch/x86/include/asm/atomic64_64.h:15 ./include/linux/atomic/atomic-arch-fallback.h:2583 ./include/linux/atomic/atomic-instrumented.h:1611 net/core/sock_diag.c:29)\nkasan_check_range (mm/kasan/generic.c:183 mm/kasan/generic.c:189)\n__sock_gen_cookie (./arch/x86/include/asm/atomic64_64.h:15 ./include/linux/atomic/atomic-arch-fallback.h:2583 ./include/linux/atomic/atomic-instrumented.h:1611 net/core/sock_diag.c:29)\nbpf_get_socket_ptr_cookie (./arch/x86/include/asm/preempt.h:94 ./include/linux/sock_diag.h:42 net/core/filter.c:5094 net/core/filter.c:5092)\nbpf_prog_875642cf11f1d139___sock_release+0x6e/0x8e\nbpf_trampoline_6442506592+0x47/0xaf\n__sock_release (net/socket.c:652)\n__sock_create (net/socket.c:1601)\n...\nAllocated by task 299 on cpu 2 at 78.328492s:\nkasan_save_stack (mm/kasan/common.c:48)\nkasan_save_track (mm/kasan/common.c:68)\n__kasan_slab_alloc (mm/kasan/common.c:312 mm/kasan/common.c:338)\nkmem_cache_alloc_noprof (mm/slub.c:3941 mm/slub.c:4000 mm/slub.c:4007)\nsk_prot_alloc (net/core/sock.c:2075)\nsk_alloc (net/core/sock.c:2134)\ninet_create (net/ipv4/af_inet.c:327 net/ipv4/af_inet.c:252)\n__sock_create (net/socket.c:1572)\n__sys_socket (net/socket.c:1660 net/socket.c:1644 net/socket.c:1706)\n__x64_sys_socket (net/socket.c:1718)\ndo_syscall_64 (arch/x86/entry/common.c:52 arch/x86/entry/common.c:83)\nentry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:130)\n\nFreed by task 299 on cpu 2 at 78.328502s:\nkasan_save_stack (mm/kasan/common.c:48)\nkasan_save_track (mm/kasan/common.c:68)\nkasan_save_free_info (mm/kasan/generic.c:582)\npoison_slab_object (mm/kasan/common.c:242)\n__kasan_slab_free (mm/kasan/common.c:256)\nkmem_cache_free (mm/slub.c:4437 mm/slub.c:4511)\n__sk_destruct (net/core/sock.c:2117 net/core/sock.c:2208)\ninet_create (net/ipv4/af_inet.c:397 net/ipv4/af_inet.c:252)\n__sock_create (net/socket.c:1572)\n__sys_socket (net/socket.c:1660 net/socket.c:1644 net/socket.c:1706)\n__x64_sys_socket (net/socket.c:1718)\ndo_syscall_64 (arch/x86/entry/common.c:52 arch/x86/entry/common.c:83)\nentry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:130)\n\nFix this by clearing the struct socket reference in sk_common_release() to cover\nall protocol families create functions, which may already attached the\nreference to the sk object with sock_init_data().(CVE-2024-40954)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nnetns: Make get_net_ns() handle zero refcount net\n\nSyzkaller hit a warning:\nrefcount_t: addition on 0; use-after-free.\nWARNING: CPU: 3 PID: 7890 at lib/refcount.c:25 refcount_warn_saturate+0xdf/0x1d0\nModules linked in:\nCPU: 3 PID: 7890 Comm: tun Not tainted 6.10.0-rc3-00100-gcaa4f9578aba-dirty #310\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 04/01/2014\nRIP: 0010:refcount_warn_saturate+0xdf/0x1d0\nCode: 41 49 04 31 ff 89 de e8 9f 1e cd fe 84 db 75 9c e8 76 26 cd fe c6 05 b6 41 49 04 01 90 48 c7 c7 b8 8e 25 86 e8 d2 05 b5 fe 90 <0f> 0b 90 90 e9 79 ff ff ff e8 53 26 cd fe 0f b6 1\nRSP: 0018:ffff8881067b7da0 EFLAGS: 00010286\nRAX: 0000000000000000 RBX: 0000000000000000 RCX: ffffffff811c72ac\nRDX: ffff8881026a2140 RSI: ffffffff811c72b5 RDI: 0000000000000001\nRBP: ffff8881067b7db0 R08: 0000000000000000 R09: 205b5d3730353139\nR10: 0000000000000000 R11: 205d303938375420 R12: ffff8881086500c4\nR13: ffff8881086500c4 R14: ffff8881086500b0 R15: ffff888108650040\nFS:  00007f5b2961a4c0(0000) GS:ffff88823bd00000(0000) knlGS:0000000000000000\nCS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 000055d7ed36fd18 CR3: 00000001482f6000 CR4: 00000000000006f0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nCall Trace:\n <TASK>\n ? show_regs+0xa3/0xc0\n ? __warn+0xa5/0x1c0\n ? refcount_warn_saturate+0xdf/0x1d0\n ? report_bug+0x1fc/0x2d0\n ? refcount_warn_saturate+0xdf/0x1d0\n ? handle_bug+0xa1/0x110\n ? exc_invalid_op+0x3c/0xb0\n ? asm_exc_invalid_op+0x1f/0x30\n ? __warn_printk+0xcc/0x140\n ? __warn_printk+0xd5/0x140\n ? refcount_warn_saturate+0xdf/0x1d0\n get_net_ns+0xa4/0xc0\n ? __pfx_get_net_ns+0x10/0x10\n open_related_ns+0x5a/0x130\n __tun_chr_ioctl+0x1616/0x2370\n ? __sanitizer_cov_trace_switch+0x58/0xa0\n ? __sanitizer_cov_trace_const_cmp2+0x1c/0x30\n ? __pfx_tun_chr_ioctl+0x10/0x10\n tun_chr_ioctl+0x2f/0x40\n __x64_sys_ioctl+0x11b/0x160\n x64_sys_call+0x1211/0x20d0\n do_syscall_64+0x9e/0x1d0\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\nRIP: 0033:0x7f5b28f165d7\nCode: b3 66 90 48 8b 05 b1 48 2d 00 64 c7 00 26 00 00 00 48 c7 c0 ff ff ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 81 48 2d 00 8\nRSP: 002b:00007ffc2b59c5e8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010\nRAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f5b28f165d7\nRDX: 0000000000000000 RSI: 00000000000054e3 RDI: 0000000000000003\nRBP: 00007ffc2b59c650 R08: 00007f5b291ed8c0 R09: 00007f5b2961a4c0\nR10: 0000000029690010 R11: 0000000000000246 R12: 0000000000400730\nR13: 00007ffc2b59cf40 R14: 0000000000000000 R15: 0000000000000000\n </TASK>\nKernel panic - not syncing: kernel: panic_on_warn set ...\n\nThis is trigger as below:\n          ns0                                    ns1\ntun_set_iff() //dev is tun0\n   tun->dev = dev\n//ip link set tun0 netns ns1\n                                       put_net() //ref is 0\n__tun_chr_ioctl() //TUNGETDEVNETNS\n   net = dev_net(tun->dev);\n   open_related_ns(&net->ns, get_net_ns); //ns1\n     get_net_ns()\n        get_net() //addition on 0\n\nUse maybe_get_net() in get_net_ns in case net's ref is zero to fix this(CVE-2024-40958)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\ncachefiles: fix slab-use-after-free in cachefiles_withdraw_cookie()\n\nWe got the following issue in our fault injection stress test:\n\n==================================================================\nBUG: KASAN: slab-use-after-free in cachefiles_withdraw_cookie+0x4d9/0x600\nRead of size 8 at addr ffff888118efc000 by task kworker/u78:0/109\n\nCPU: 13 PID: 109 Comm: kworker/u78:0 Not tainted 6.8.0-dirty #566\nCall Trace:\n <TASK>\n kasan_report+0x93/0xc0\n cachefiles_withdraw_cookie+0x4d9/0x600\n fscache_cookie_state_machine+0x5c8/0x1230\n fscache_cookie_worker+0x91/0x1c0\n process_one_work+0x7fa/0x1800\n [...]\n\nAllocated by task 117:\n kmalloc_trace+0x1b3/0x3c0\n cachefiles_acquire_volume+0xf3/0x9c0\n fscache_create_volume_work+0x97/0x150\n process_one_work+0x7fa/0x1800\n [...]\n\nFreed by task 120301:\n kfree+0xf1/0x2c0\n cachefiles_withdraw_cache+0x3fa/0x920\n cachefiles_put_unbind_pincount+0x1f6/0x250\n cachefiles_daemon_release+0x13b/0x290\n __fput+0x204/0xa00\n task_work_run+0x139/0x230\n do_exit+0x87a/0x29b0\n [...]\n==================================================================\n\nFollowing is the process that triggers the issue:\n\n           p1                |             p2\n------------------------------------------------------------\n                              fscache_begin_lookup\n                               fscache_begin_volume_access\n                                fscache_cache_is_live(fscache_cache)\ncachefiles_daemon_release\n cachefiles_put_unbind_pincount\n  cachefiles_daemon_unbind\n   cachefiles_withdraw_cache\n    fscache_withdraw_cache\n     fscache_set_cache_state(cache, FSCACHE_CACHE_IS_WITHDRAWN);\n    cachefiles_withdraw_objects(cache)\n    fscache_wait_for_objects(fscache)\n      atomic_read(&fscache_cache->object_count) == 0\n                              fscache_perform_lookup\n                               cachefiles_lookup_cookie\n                                cachefiles_alloc_object\n                                 refcount_set(&object->ref, 1);\n                                 object->volume = volume\n                                 fscache_count_object(vcookie->cache);\n                                  atomic_inc(&fscache_cache->object_count)\n    cachefiles_withdraw_volumes\n     cachefiles_withdraw_volume\n      fscache_withdraw_volume\n      __cachefiles_free_volume\n       kfree(cachefiles_volume)\n                              fscache_cookie_state_machine\n                               cachefiles_withdraw_cookie\n                                cache = object->volume->cache;\n                                // cachefiles_volume UAF !!!\n\nAfter setting FSCACHE_CACHE_IS_WITHDRAWN, wait for all the cookie lookups\nto complete first, and then wait for fscache_cache->object_count == 0 to\navoid the cookie exiting after the volume has been freed and triggering\nthe above issue. Therefore call fscache_withdraw_volume() before calling\ncachefiles_withdraw_objects().\n\nThis way, after setting FSCACHE_CACHE_IS_WITHDRAWN, only the following two\ncases will occur:\n1) fscache_begin_lookup fails in fscache_begin_volume_access().\n2) fscache_withdraw_volume() will ensure that fscache_count_object() has\n   been executed before calling fscache_wait_for_objects().(CVE-2024-41057)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nscsi: mpi3mr: Sanitise num_phys\n\nInformation is stored in mr_sas_port->phy_mask, values larger then size of\nthis field shouldn't be allowed.(CVE-2024-42159)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nvhost/vsock: always initialize seqpacket_allow\n\nThere are two issues around seqpacket_allow:\n1. seqpacket_allow is not initialized when socket is\n   created. Thus if features are never set, it will be\n   read uninitialized.\n2. if VIRTIO_VSOCK_F_SEQPACKET is set and then cleared,\n   then seqpacket_allow will not be cleared appropriately\n   (existing apps I know about don't usually do this but\n    it's legal and there's no way to be sure no one relies\n    on this).\n\nTo fix:\n\t- initialize seqpacket_allow after allocation\n\t- set it unconditionally in set_features(CVE-2024-43873)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amdgpu: Validate TA binary size\n\nAdd TA binary size validation to avoid OOB write.\n\n(cherry picked from commit c0a04e3570d72aaf090962156ad085e37c62e442)(CVE-2024-44977)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: flowtable: validate vlan header\n\nEnsure there is sufficient room to access the protocol field of the\nVLAN header, validate it once before the flowtable lookup.\n\n=====================================================\nBUG: KMSAN: uninit-value in nf_flow_offload_inet_hook+0x45a/0x5f0 net/netfilter/nf_flow_table_inet.c:32\n nf_flow_offload_inet_hook+0x45a/0x5f0 net/netfilter/nf_flow_table_inet.c:32\n nf_hook_entry_hookfn include/linux/netfilter.h:154 [inline]\n nf_hook_slow+0xf4/0x400 net/netfilter/core.c:626\n nf_hook_ingress include/linux/netfilter_netdev.h:34 [inline]\n nf_ingress net/core/dev.c:5440 [inline](CVE-2024-44983)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\natm: idt77252: prevent use after free in dequeue_rx()\n\nWe can't dereference \"skb\" after calling vcc->push() because the skb\nis released.(CVE-2024-44998)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nHID: amd_sfh: free driver_data after destroying hid device\n\nHID driver callbacks aren't called anymore once hid_destroy_device() has\nbeen called. Hence, hid driver_data should be freed only after the\nhid_destroy_device() function returned as driver_data is used in several\ncallbacks.\n\nI observed a crash with kernel 6.10.0 on my T14s Gen 3, after enabling\nKASAN to debug memory allocation, I got this output:\n\n  [   13.050438] ==================================================================\n  [   13.054060] BUG: KASAN: slab-use-after-free in amd_sfh_get_report+0x3ec/0x530 [amd_sfh]\n  [   13.054809] psmouse serio1: trackpoint: Synaptics TrackPoint firmware: 0x02, buttons: 3/3\n  [   13.056432] Read of size 8 at addr ffff88813152f408 by task (udev-worker)/479\n\n  [   13.060970] CPU: 5 PID: 479 Comm: (udev-worker) Not tainted 6.10.0-arch1-2 #1 893bb55d7f0073f25c46adbb49eb3785fefd74b0\n  [   13.063978] Hardware name: LENOVO 21CQCTO1WW/21CQCTO1WW, BIOS R22ET70W (1.40 ) 03/21/2024\n  [   13.067860] Call Trace:\n  [   13.069383] input: TPPS/2 Synaptics TrackPoint as /devices/platform/i8042/serio1/input/input8\n  [   13.071486]  <TASK>\n  [   13.071492]  dump_stack_lvl+0x5d/0x80\n  [   13.074870] snd_hda_intel 0000:33:00.6: enabling device (0000 -> 0002)\n  [   13.078296]  ? amd_sfh_get_report+0x3ec/0x530 [amd_sfh 05f43221435b5205f734cd9da29399130f398a38]\n  [   13.082199]  print_report+0x174/0x505\n  [   13.085776]  ? __pfx__raw_spin_lock_irqsave+0x10/0x10\n  [   13.089367]  ? srso_alias_return_thunk+0x5/0xfbef5\n  [   13.093255]  ? amd_sfh_get_report+0x3ec/0x530 [amd_sfh 05f43221435b5205f734cd9da29399130f398a38]\n  [   13.097464]  kasan_report+0xc8/0x150\n  [   13.101461]  ? amd_sfh_get_report+0x3ec/0x530 [amd_sfh 05f43221435b5205f734cd9da29399130f398a38]\n  [   13.105802]  amd_sfh_get_report+0x3ec/0x530 [amd_sfh 05f43221435b5205f734cd9da29399130f398a38]\n  [   13.110303]  amdtp_hid_request+0xb8/0x110 [amd_sfh 05f43221435b5205f734cd9da29399130f398a38]\n  [   13.114879]  ? srso_alias_return_thunk+0x5/0xfbef5\n  [   13.119450]  sensor_hub_get_feature+0x1d3/0x540 [hid_sensor_hub 3f13be3016ff415bea03008d45d99da837ee3082]\n  [   13.124097]  hid_sensor_parse_common_attributes+0x4d0/0xad0 [hid_sensor_iio_common c3a5cbe93969c28b122609768bbe23efe52eb8f5]\n  [   13.127404]  ? srso_alias_return_thunk+0x5/0xfbef5\n  [   13.131925]  ? __pfx_hid_sensor_parse_common_attributes+0x10/0x10 [hid_sensor_iio_common c3a5cbe93969c28b122609768bbe23efe52eb8f5]\n  [   13.136455]  ? _raw_spin_lock_irqsave+0x96/0xf0\n  [   13.140197]  ? __pfx__raw_spin_lock_irqsave+0x10/0x10\n  [   13.143602]  ? devm_iio_device_alloc+0x34/0x50 [industrialio 3d261d5e5765625d2b052be40e526d62b1d2123b]\n  [   13.147234]  ? srso_alias_return_thunk+0x5/0xfbef5\n  [   13.150446]  ? __devm_add_action+0x167/0x1d0\n  [   13.155061]  hid_gyro_3d_probe+0x120/0x7f0 [hid_sensor_gyro_3d 63da36a143b775846ab2dbb86c343b401b5e3172]\n  [   13.158581]  ? srso_alias_return_thunk+0x5/0xfbef5\n  [   13.161814]  platform_probe+0xa2/0x150\n  [   13.165029]  really_probe+0x1e3/0x8a0\n  [   13.168243]  __driver_probe_device+0x18c/0x370\n  [   13.171500]  driver_probe_device+0x4a/0x120\n  [   13.175000]  __driver_attach+0x190/0x4a0\n  [   13.178521]  ? __pfx___driver_attach+0x10/0x10\n  [   13.181771]  bus_for_each_dev+0x106/0x180\n  [   13.185033]  ? __pfx__raw_spin_lock+0x10/0x10\n  [   13.188229]  ? __pfx_bus_for_each_dev+0x10/0x10\n  [   13.191446]  ? srso_alias_return_thunk+0x5/0xfbef5\n  [   13.194382]  bus_add_driver+0x29e/0x4d0\n  [   13.197328]  driver_register+0x1a5/0x360\n  [   13.200283]  ? __pfx_hid_gyro_3d_platform_driver_init+0x10/0x10 [hid_sensor_gyro_3d 63da36a143b775846ab2dbb86c343b401b5e3172]\n  [   13.203362]  do_one_initcall+0xa7/0x380\n  [   13.206432]  ? __pfx_do_one_initcall+0x10/0x10\n  [   13.210175]  ? srso_alias_return_thunk+0x5/0xfbef5\n  [   13.213211]  ? kasan_unpoison+0x44/0x70\n  [   13.216688]  do_init_module+0x238/0x750\n  [   13.2196\n---truncated---(CVE-2024-46746)\n\nIn the Linux kernel, the following vulnerability has been resolved:  firmware: arm_scmi: Fix double free in OPTEE transport  Channels can be shared between protocols, avoid freeing the same channel descriptors twice when unloading the stack.(CVE-2024-49853)\n\nIn the Linux kernel, the following vulnerability has been resolved:  platform/x86: x86-android-tablets: Fix use after free on platform_device_register() errors  x86_android_tablet_remove() frees the pdevs[] array, so it should not be used after calling x86_android_tablet_remove().  When platform_device_register() fails, store the pdevs[x] PTR_ERR() value into the local ret variable before calling x86_android_tablet_remove() to avoid using pdevs[] after it has been freed.(CVE-2024-49986)\n\n(CVE-2024-50121)\n\nIn the Linux kernel, the following vulnerability has been resolved:  Bluetooth: SCO: Fix UAF on sco_sock_timeout  conn->sk maybe have been unlinked/freed while waiting for sco_conn_lock so this checks if the conn->sk is still valid by checking if it part of sco_sk_list.(CVE-2024-50125)\n\nIn the Linux kernel, the following vulnerability has been resolved:  dm cache: fix flushing uninitialized delayed_work on cache_ctr error  An unexpected WARN_ON from flush_work() may occur when cache creation fails, caused by destroying the uninitialized delayed_work waker in the error path of cache_create(). For example, the warning appears on the superblock checksum error.  Reproduce steps:  dmsetup create cmeta --table \"0 8192 linear /dev/sdc 0\" dmsetup create cdata --table \"0 65536 linear /dev/sdc 8192\" dmsetup create corig --table \"0 524288 linear /dev/sdc 262144\" dd if=/dev/urandom of=/dev/mapper/cmeta bs=4k count=1 oflag=direct dmsetup create cache --table \"0 524288 cache /dev/mapper/cmeta \\ /dev/mapper/cdata /dev/mapper/corig 128 2 metadata2 writethrough smq 0\"  Kernel logs:  (snip) WARNING: CPU: 0 PID: 84 at kernel/workqueue.c:4178 __flush_work+0x5d4/0x890  Fix by pulling out the cancel_delayed_work_sync() from the constructor's error path. This patch doesn't affect the use-after-free fix for concurrent dm_resume and dm_destroy (commit 6a459d8edbdb (\"dm cache: Fix UAF in destroy()\")) as cache_dtr is not changed.(CVE-2024-50280)\n\nIn the Linux kernel, the following vulnerability has been resolved:  usb: dwc3: fix fault at system suspend if device was already runtime suspended  If the device was already runtime suspended then during system suspend we cannot access the device registers else it will crash.  Also we cannot access any registers after dwc3_core_exit() on some platforms so move the dwc3_enable_susphy() call to the top.(CVE-2024-53070)\n\nIn the Linux kernel, the following vulnerability has been resolved:  smb: client: Fix use-after-free of network namespace.  Recently, we got a customer report that CIFS triggers oops while reconnecting to a server.  [0]  The workload runs on Kubernetes, and some pods mount CIFS servers in non-root network namespaces.  The problem rarely happened, but it was always while the pod was dying.  The root cause is wrong reference counting for network namespace.  CIFS uses kernel sockets, which do not hold refcnt of the netns that the socket belongs to.  That means CIFS must ensure the socket is always freed before its netns; otherwise, use-after-free happens.  The repro steps are roughly:    1. mount CIFS in a non-root netns   2. drop packets from the netns   3. destroy the netns   4. unmount CIFS  We can reproduce the issue quickly with the script [1] below and see the splat [2] if CONFIG_NET_NS_REFCNT_TRACKER is enabled.  When the socket is TCP, it is hard to guarantee the netns lifetime without holding refcnt due to async timers.  Let's hold netns refcnt for each socket as done for SMC in commit 9744d2bf1976 (\"smc: Fix use-after-free in tcp_write_timer_handler().\").  Note that we need to move put_net() from cifs_put_tcp_session() to clean_demultiplex_info(); otherwise, __sock_create() still could touch a freed netns while cifsd tries to reconnect from cifs_demultiplex_thread().  Also, maybe_get_net() cannot be put just before __sock_create() because the code is not under RCU and there is a small chance that the same address happened to be reallocated to another netns.  [0]: CIFS: VFS: \\\\XXXXXXXXXXX has not responded in 15 seconds. Reconnecting... CIFS: Serverclose failed 4 times, giving up Unable to handle kernel paging request at virtual address 14de99e461f84a07 Mem abort info:   ESR = 0x0000000096000004   EC = 0x25: DABT (current EL), IL = 32 bits   SET = 0, FnV = 0   EA = 0, S1PTW = 0   FSC = 0x04: level 0 translation fault Data abort info:   ISV = 0, ISS = 0x00000004   CM = 0, WnR = 0 [14de99e461f84a07] address between user and kernel address ranges Internal error: Oops: 0000000096000004 [#1] SMP Modules linked in: cls_bpf sch_ingress nls_utf8 cifs cifs_arc4 cifs_md4 dns_resolver tcp_diag inet_diag veth xt_state xt_connmark nf_conntrack_netlink xt_nat xt_statistic xt_MASQUERADE xt_mark xt_addrtype ipt_REJECT nf_reject_ipv4 nft_chain_nat nf_nat xt_conntrack nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 xt_comment nft_compat nf_tables nfnetlink overlay nls_ascii nls_cp437 sunrpc vfat fat aes_ce_blk aes_ce_cipher ghash_ce sm4_ce_cipher sm4 sm3_ce sm3 sha3_ce sha512_ce sha512_arm64 sha1_ce ena button sch_fq_codel loop fuse configfs dmi_sysfs sha2_ce sha256_arm64 dm_mirror dm_region_hash dm_log dm_mod dax efivarfs CPU: 5 PID: 2690970 Comm: cifsd Not tainted 6.1.103-109.184.amzn2023.aarch64 #1 Hardware name: Amazon EC2 r7g.4xlarge/, BIOS 1.0 11/1/2018 pstate: 00400005 (nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : fib_rules_lookup+0x44/0x238 lr : __fib_lookup+0x64/0xbc sp : ffff8000265db790 x29: ffff8000265db790 x28: 0000000000000000 x27: 000000000000bd01 x26: 0000000000000000 x25: ffff000b4baf8000 x24: ffff00047b5e4580 x23: ffff8000265db7e0 x22: 0000000000000000 x21: ffff00047b5e4500 x20: ffff0010e3f694f8 x19: 14de99e461f849f7 x18: 0000000000000000 x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000 x14: 0000000000000000 x13: 0000000000000000 x12: 3f92800abd010002 x11: 0000000000000001 x10: ffff0010e3f69420 x9 : ffff800008a6f294 x8 : 0000000000000000 x7 : 0000000000000006 x6 : 0000000000000000 x5 : 0000000000000001 x4 : ffff001924354280 x3 : ffff8000265db7e0 x2 : 0000000000000000 x1 : ffff0010e3f694f8 x0 : ffff00047b5e4500 Call trace:  fib_rules_lookup+0x44/0x238  __fib_lookup+0x64/0xbc  ip_route_output_key_hash_rcu+0x2c4/0x398  ip_route_output_key_hash+0x60/0x8c  tcp_v4_connect+0x290/0x488  __inet_stream_connect+0x108/0x3d0  inet_stream_connect+0x50/0x78  kernel_connect+0x6c/0xac  generic_ip_conne ---truncated---(CVE-2024-53095)\n\nIn the Linux kernel, the following vulnerability has been resolved:  drm/amd/display: Adjust VSDB parser for replay feature  At some point, the IEEE ID identification for the replay check in the AMD EDID was added. However, this check causes the following out-of-bounds issues when using KASAN:  [   27.804016] BUG: KASAN: slab-out-of-bounds in amdgpu_dm_update_freesync_caps+0xefa/0x17a0 [amdgpu] [   27.804788] Read of size 1 at addr ffff8881647fdb00 by task systemd-udevd/383  ...  [   27.821207] Memory state around the buggy address: [   27.821215]  ffff8881647fda00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [   27.821224]  ffff8881647fda80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [   27.821234] >ffff8881647fdb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [   27.821243]                    ^ [   27.821250]  ffff8881647fdb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [   27.821259]  ffff8881647fdc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [   27.821268] ==================================================================  This is caused because the ID extraction happens outside of the range of the edid lenght. This commit addresses this issue by considering the amd_vsdb_block size.  (cherry picked from commit b7e381b1ccd5e778e3d9c44c669ad38439a861d8)(CVE-2024-53108)\n\nIn the Linux kernel, the following vulnerability has been resolved:  drm/rockchip: vop: Fix a dereferenced before check warning  The 'state' can't be NULL, we should check crtc_state.  Fix warning: drivers/gpu/drm/rockchip/rockchip_drm_vop.c:1096 vop_plane_atomic_async_check() warn: variable dereferenced before check 'state' (see line 1077)(CVE-2024-53129)\n\nIn the Linux kernel, the following vulnerability has been resolved:  initramfs: avoid filename buffer overrun  The initramfs filename field is defined in Documentation/driver-api/early-userspace/buffer-format.rst as:   37 cpio_file := ALGN(4) + cpio_header + filename + \"\\0\" + ALGN(4) + data ...  55 ============= ================== =========================  56 Field name    Field size         Meaning  57 ============= ================== ========================= ...  70 c_namesize    8 bytes            Length of filename, including final \\0  When extracting an initramfs cpio archive, the kernel's do_name() path handler assumes a zero-terminated path at @collected, passing it directly to filp_open() / init_mkdir() / init_mknod().  If a specially crafted cpio entry carries a non-zero-terminated filename and is followed by uninitialized memory, then a file may be created with trailing characters that represent the uninitialized memory. The ability to create an initramfs entry would imply already having full control of the system, so the buffer overrun shouldn't be considered a security vulnerability.  Append the output of the following bash script to an existing initramfs and observe any created /initramfs_test_fname_overrunAA* path. E.g.   ./reproducer.sh | gzip >> /myinitramfs  It's easiest to observe non-zero uninitialized memory when the output is gzipped, as it'll overflow the heap allocated @out_buf in __gunzip(), rather than the initrd_start+initrd_size block.  ---- reproducer.sh ---- nilchar=\"A\" # change to \"\\0\" to properly zero terminate / pad magic=\"070701\" ino=1 mode=$(( 0100777 )) uid=0 gid=0 nlink=1 mtime=1 filesize=0 devmajor=0 devminor=1 rdevmajor=0 rdevminor=0 csum=0 fname=\"initramfs_test_fname_overrun\" namelen=$(( ${#fname} + 1 )) # plus one to account for terminator  printf \"%s%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%s\" \\  $magic $ino $mode $uid $gid $nlink $mtime $filesize \\  $devmajor $devminor $rdevmajor $rdevminor $namelen $csum $fname  termpadlen=$(( 1 + ((4 - ((110 + $namelen) & 3)) % 4) )) printf \"%.s${nilchar}\" $(seq 1 $termpadlen) ---- reproducer.sh ----  Symlink filename fields handled in do_symlink() won't overrun past the data segment, due to the explicit zero-termination of the symlink target.  Fix filename buffer overrun by aborting the initramfs FSM if any cpio entry doesn't carry a zero-terminator at the expected (name_len - 1) offset.(CVE-2024-53142)",
				"category":"general",
				"title":"Description"
			},
			{
				"text":"An update for kernel is now available for openEuler-24.03-LTS.\n\nopenEuler Security has rated this update as having a security impact of high. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.",
				"category":"general",
				"title":"Topic"
			},
			{
				"text":"High",
				"category":"general",
				"title":"Severity"
			},
			{
				"text":"kernel",
				"category":"general",
				"title":"Affected Component"
			}
		],
		"publisher":{
			"issuing_authority":"openEuler security committee",
			"name":"openEuler",
			"namespace":"https://www.openeuler.org",
			"contact_details":"openeuler-security@openeuler.org",
			"category":"vendor"
		},
		"references":[
			{
				"summary":"openEuler-SA-2024-2590",
				"category":"self",
				"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2590"
			},
			{
				"summary":"CVE-2024-36972",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-36972&packageName=kernel"
			},
			{
				"summary":"CVE-2024-40954",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-40954&packageName=kernel"
			},
			{
				"summary":"CVE-2024-40958",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-40958&packageName=kernel"
			},
			{
				"summary":"CVE-2024-41057",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-41057&packageName=kernel"
			},
			{
				"summary":"CVE-2024-42159",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-42159&packageName=kernel"
			},
			{
				"summary":"CVE-2024-43873",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-43873&packageName=kernel"
			},
			{
				"summary":"CVE-2024-44977",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-44977&packageName=kernel"
			},
			{
				"summary":"CVE-2024-44983",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-44983&packageName=kernel"
			},
			{
				"summary":"CVE-2024-44998",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-44998&packageName=kernel"
			},
			{
				"summary":"CVE-2024-46746",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-46746&packageName=kernel"
			},
			{
				"summary":"CVE-2024-49853",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-49853&packageName=kernel"
			},
			{
				"summary":"CVE-2024-49986",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-49986&packageName=kernel"
			},
			{
				"summary":"CVE-2024-50121",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-50121&packageName=kernel"
			},
			{
				"summary":"CVE-2024-50125",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-50125&packageName=kernel"
			},
			{
				"summary":"CVE-2024-50280",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-50280&packageName=kernel"
			},
			{
				"summary":"CVE-2024-53070",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-53070&packageName=kernel"
			},
			{
				"summary":"CVE-2024-53095",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-53095&packageName=kernel"
			},
			{
				"summary":"CVE-2024-53108",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-53108&packageName=kernel"
			},
			{
				"summary":"CVE-2024-53129",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-53129&packageName=kernel"
			},
			{
				"summary":"CVE-2024-53142",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-53142&packageName=kernel"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-36972"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-40954"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-40958"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-41057"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-42159"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-43873"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-44977"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-44983"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-44998"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-46746"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-49853"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-49986"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50121"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50125"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50280"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-53070"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-53095"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-53108"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-53129"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-53142"
			},
			{
				"summary":"openEuler-SA-2024-2590 vex file",
				"category":"self",
				"url":"https://repo.openeuler.org/security/data/csaf/advisories/2024/csaf-openeuler-sa-2024-2590.json"
			}
		],
		"title":"An update for kernel is now available for openEuler-24.03-LTS",
		"tracking":{
			"initial_release_date":"2024-12-27T20:33:52+08:00",
			"revision_history":[
				{
					"date":"2024-12-27T20:33:52+08:00",
					"summary":"Initial",
					"number":"1.0.0"
				}
			],
			"generator":{
				"date":"2024-12-27T20:33:52+08:00",
				"engine":{
					"name":"openEuler CSAF Tool V1.0"
				}
			},
			"current_release_date":"2024-12-27T20:33:52+08:00",
			"id":"openEuler-SA-2024-2590",
			"version":"1.0.0",
			"status":"final"
		}
	},
	"product_tree":{
		"branches":[
			{
				"name":"openEuler",
				"category":"vendor",
				"branches":[
					{
						"name":"openEuler",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"openEuler-24.03-LTS",
									"name":"openEuler-24.03-LTS"
								},
								"name":"openEuler-24.03-LTS",
								"category":"product_version"
							}
						],
						"category":"product_name"
					},
					{
						"name":"aarch64",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"bpftool-6.6.0-72.0.0.64.oe2403.aarch64.rpm",
									"name":"bpftool-6.6.0-72.0.0.64.oe2403.aarch64.rpm"
								},
								"name":"bpftool-6.6.0-72.0.0.64.oe2403.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"bpftool-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64.rpm",
									"name":"bpftool-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64.rpm"
								},
								"name":"bpftool-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-6.6.0-72.0.0.64.oe2403.aarch64.rpm",
									"name":"kernel-6.6.0-72.0.0.64.oe2403.aarch64.rpm"
								},
								"name":"kernel-6.6.0-72.0.0.64.oe2403.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64.rpm",
									"name":"kernel-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64.rpm"
								},
								"name":"kernel-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-debugsource-6.6.0-72.0.0.64.oe2403.aarch64.rpm",
									"name":"kernel-debugsource-6.6.0-72.0.0.64.oe2403.aarch64.rpm"
								},
								"name":"kernel-debugsource-6.6.0-72.0.0.64.oe2403.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-devel-6.6.0-72.0.0.64.oe2403.aarch64.rpm",
									"name":"kernel-devel-6.6.0-72.0.0.64.oe2403.aarch64.rpm"
								},
								"name":"kernel-devel-6.6.0-72.0.0.64.oe2403.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-headers-6.6.0-72.0.0.64.oe2403.aarch64.rpm",
									"name":"kernel-headers-6.6.0-72.0.0.64.oe2403.aarch64.rpm"
								},
								"name":"kernel-headers-6.6.0-72.0.0.64.oe2403.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-source-6.6.0-72.0.0.64.oe2403.aarch64.rpm",
									"name":"kernel-source-6.6.0-72.0.0.64.oe2403.aarch64.rpm"
								},
								"name":"kernel-source-6.6.0-72.0.0.64.oe2403.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-tools-6.6.0-72.0.0.64.oe2403.aarch64.rpm",
									"name":"kernel-tools-6.6.0-72.0.0.64.oe2403.aarch64.rpm"
								},
								"name":"kernel-tools-6.6.0-72.0.0.64.oe2403.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-tools-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64.rpm",
									"name":"kernel-tools-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64.rpm"
								},
								"name":"kernel-tools-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-tools-devel-6.6.0-72.0.0.64.oe2403.aarch64.rpm",
									"name":"kernel-tools-devel-6.6.0-72.0.0.64.oe2403.aarch64.rpm"
								},
								"name":"kernel-tools-devel-6.6.0-72.0.0.64.oe2403.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"perf-6.6.0-72.0.0.64.oe2403.aarch64.rpm",
									"name":"perf-6.6.0-72.0.0.64.oe2403.aarch64.rpm"
								},
								"name":"perf-6.6.0-72.0.0.64.oe2403.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"perf-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64.rpm",
									"name":"perf-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64.rpm"
								},
								"name":"perf-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"python3-perf-6.6.0-72.0.0.64.oe2403.aarch64.rpm",
									"name":"python3-perf-6.6.0-72.0.0.64.oe2403.aarch64.rpm"
								},
								"name":"python3-perf-6.6.0-72.0.0.64.oe2403.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"python3-perf-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64.rpm",
									"name":"python3-perf-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64.rpm"
								},
								"name":"python3-perf-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64.rpm",
								"category":"product_version"
							}
						],
						"category":"architecture"
					},
					{
						"name":"x86_64",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"bpftool-6.6.0-72.0.0.64.oe2403.x86_64.rpm",
									"name":"bpftool-6.6.0-72.0.0.64.oe2403.x86_64.rpm"
								},
								"name":"bpftool-6.6.0-72.0.0.64.oe2403.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"bpftool-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64.rpm",
									"name":"bpftool-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64.rpm"
								},
								"name":"bpftool-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-6.6.0-72.0.0.64.oe2403.x86_64.rpm",
									"name":"kernel-6.6.0-72.0.0.64.oe2403.x86_64.rpm"
								},
								"name":"kernel-6.6.0-72.0.0.64.oe2403.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64.rpm",
									"name":"kernel-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64.rpm"
								},
								"name":"kernel-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-debugsource-6.6.0-72.0.0.64.oe2403.x86_64.rpm",
									"name":"kernel-debugsource-6.6.0-72.0.0.64.oe2403.x86_64.rpm"
								},
								"name":"kernel-debugsource-6.6.0-72.0.0.64.oe2403.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-devel-6.6.0-72.0.0.64.oe2403.x86_64.rpm",
									"name":"kernel-devel-6.6.0-72.0.0.64.oe2403.x86_64.rpm"
								},
								"name":"kernel-devel-6.6.0-72.0.0.64.oe2403.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-headers-6.6.0-72.0.0.64.oe2403.x86_64.rpm",
									"name":"kernel-headers-6.6.0-72.0.0.64.oe2403.x86_64.rpm"
								},
								"name":"kernel-headers-6.6.0-72.0.0.64.oe2403.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-source-6.6.0-72.0.0.64.oe2403.x86_64.rpm",
									"name":"kernel-source-6.6.0-72.0.0.64.oe2403.x86_64.rpm"
								},
								"name":"kernel-source-6.6.0-72.0.0.64.oe2403.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-tools-6.6.0-72.0.0.64.oe2403.x86_64.rpm",
									"name":"kernel-tools-6.6.0-72.0.0.64.oe2403.x86_64.rpm"
								},
								"name":"kernel-tools-6.6.0-72.0.0.64.oe2403.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-tools-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64.rpm",
									"name":"kernel-tools-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64.rpm"
								},
								"name":"kernel-tools-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-tools-devel-6.6.0-72.0.0.64.oe2403.x86_64.rpm",
									"name":"kernel-tools-devel-6.6.0-72.0.0.64.oe2403.x86_64.rpm"
								},
								"name":"kernel-tools-devel-6.6.0-72.0.0.64.oe2403.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"perf-6.6.0-72.0.0.64.oe2403.x86_64.rpm",
									"name":"perf-6.6.0-72.0.0.64.oe2403.x86_64.rpm"
								},
								"name":"perf-6.6.0-72.0.0.64.oe2403.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"perf-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64.rpm",
									"name":"perf-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64.rpm"
								},
								"name":"perf-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"python3-perf-6.6.0-72.0.0.64.oe2403.x86_64.rpm",
									"name":"python3-perf-6.6.0-72.0.0.64.oe2403.x86_64.rpm"
								},
								"name":"python3-perf-6.6.0-72.0.0.64.oe2403.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"python3-perf-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64.rpm",
									"name":"python3-perf-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64.rpm"
								},
								"name":"python3-perf-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64.rpm",
								"category":"product_version"
							}
						],
						"category":"architecture"
					},
					{
						"name":"src",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-6.6.0-72.0.0.64.oe2403.src.rpm",
									"name":"kernel-6.6.0-72.0.0.64.oe2403.src.rpm"
								},
								"name":"kernel-6.6.0-72.0.0.64.oe2403.src.rpm",
								"category":"product_version"
							}
						],
						"category":"architecture"
					}
				]
			}
		],
		"relationships":[
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"bpftool-6.6.0-72.0.0.64.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:bpftool-6.6.0-72.0.0.64.oe2403.aarch64",
					"name":"bpftool-6.6.0-72.0.0.64.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"bpftool-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
					"name":"bpftool-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-6.6.0-72.0.0.64.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.aarch64",
					"name":"kernel-6.6.0-72.0.0.64.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
					"name":"kernel-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-debugsource-6.6.0-72.0.0.64.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-debugsource-6.6.0-72.0.0.64.oe2403.aarch64",
					"name":"kernel-debugsource-6.6.0-72.0.0.64.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-devel-6.6.0-72.0.0.64.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-devel-6.6.0-72.0.0.64.oe2403.aarch64",
					"name":"kernel-devel-6.6.0-72.0.0.64.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-headers-6.6.0-72.0.0.64.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-headers-6.6.0-72.0.0.64.oe2403.aarch64",
					"name":"kernel-headers-6.6.0-72.0.0.64.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-source-6.6.0-72.0.0.64.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-source-6.6.0-72.0.0.64.oe2403.aarch64",
					"name":"kernel-source-6.6.0-72.0.0.64.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-tools-6.6.0-72.0.0.64.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-tools-6.6.0-72.0.0.64.oe2403.aarch64",
					"name":"kernel-tools-6.6.0-72.0.0.64.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-tools-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
					"name":"kernel-tools-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-tools-devel-6.6.0-72.0.0.64.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-72.0.0.64.oe2403.aarch64",
					"name":"kernel-tools-devel-6.6.0-72.0.0.64.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"perf-6.6.0-72.0.0.64.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:perf-6.6.0-72.0.0.64.oe2403.aarch64",
					"name":"perf-6.6.0-72.0.0.64.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"perf-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:perf-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
					"name":"perf-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"python3-perf-6.6.0-72.0.0.64.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:python3-perf-6.6.0-72.0.0.64.oe2403.aarch64",
					"name":"python3-perf-6.6.0-72.0.0.64.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"python3-perf-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
					"name":"python3-perf-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"bpftool-6.6.0-72.0.0.64.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:bpftool-6.6.0-72.0.0.64.oe2403.x86_64",
					"name":"bpftool-6.6.0-72.0.0.64.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"bpftool-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
					"name":"bpftool-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-6.6.0-72.0.0.64.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.x86_64",
					"name":"kernel-6.6.0-72.0.0.64.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
					"name":"kernel-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-debugsource-6.6.0-72.0.0.64.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-debugsource-6.6.0-72.0.0.64.oe2403.x86_64",
					"name":"kernel-debugsource-6.6.0-72.0.0.64.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-devel-6.6.0-72.0.0.64.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-devel-6.6.0-72.0.0.64.oe2403.x86_64",
					"name":"kernel-devel-6.6.0-72.0.0.64.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-headers-6.6.0-72.0.0.64.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-headers-6.6.0-72.0.0.64.oe2403.x86_64",
					"name":"kernel-headers-6.6.0-72.0.0.64.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-source-6.6.0-72.0.0.64.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-source-6.6.0-72.0.0.64.oe2403.x86_64",
					"name":"kernel-source-6.6.0-72.0.0.64.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-tools-6.6.0-72.0.0.64.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-tools-6.6.0-72.0.0.64.oe2403.x86_64",
					"name":"kernel-tools-6.6.0-72.0.0.64.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-tools-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
					"name":"kernel-tools-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-tools-devel-6.6.0-72.0.0.64.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-72.0.0.64.oe2403.x86_64",
					"name":"kernel-tools-devel-6.6.0-72.0.0.64.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"perf-6.6.0-72.0.0.64.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:perf-6.6.0-72.0.0.64.oe2403.x86_64",
					"name":"perf-6.6.0-72.0.0.64.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"perf-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:perf-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
					"name":"perf-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"python3-perf-6.6.0-72.0.0.64.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:python3-perf-6.6.0-72.0.0.64.oe2403.x86_64",
					"name":"python3-perf-6.6.0-72.0.0.64.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"python3-perf-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
					"name":"python3-perf-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-6.6.0-72.0.0.64.oe2403.src.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.src",
					"name":"kernel-6.6.0-72.0.0.64.oe2403.src as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			}
		]
	},
	"vulnerabilities":[
		{
			"cve":"CVE-2024-36972",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\naf_unix: Update unix_sk(sk)->oob_skb under sk_receive_queue lock.\n\nBilly Jheng Bing-Jhong reported a race between __unix_gc() and\nqueue_oob().\n\n__unix_gc() tries to garbage-collect close()d inflight sockets,\nand then if the socket has MSG_OOB in unix_sk(sk)->oob_skb, GC\nwill drop the reference and set NULL to it locklessly.\n\nHowever, the peer socket still can send MSG_OOB message and\nqueue_oob() can update unix_sk(sk)->oob_skb concurrently, leading\nNULL pointer dereference. [0]\n\nTo fix the issue, let's update unix_sk(sk)->oob_skb under the\nsk_receive_queue's lock and take it everywhere we touch oob_skb.\n\nNote that we defer kfree_skb() in manage_oob() to silence lockdep\nfalse-positive (See [1]).\n\n[0]:\nBUG: kernel NULL pointer dereference, address: 0000000000000008\n PF: supervisor write access in kernel mode\n PF: error_code(0x0002) - not-present page\nPGD 8000000009f5e067 P4D 8000000009f5e067 PUD 9f5d067 PMD 0\nOops: 0002 [#1] PREEMPT SMP PTI\nCPU: 3 PID: 50 Comm: kworker/3:1 Not tainted 6.9.0-rc5-00191-gd091e579b864 #110\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.0-0-gd239552ce722-prebuilt.qemu.org 04/01/2014\nWorkqueue: events delayed_fput\nRIP: 0010:skb_dequeue (./include/linux/skbuff.h:2386 ./include/linux/skbuff.h:2402 net/core/skbuff.c:3847)\nCode: 39 e3 74 3e 8b 43 10 48 89 ef 83 e8 01 89 43 10 49 8b 44 24 08 49 c7 44 24 08 00 00 00 00 49 8b 14 24 49 c7 04 24 00 00 00 00 <48> 89 42 08 48 89 10 e8 e7 c5 42 00 4c 89 e0 5b 5d 41 5c c3 cc cc\nRSP: 0018:ffffc900001bfd48 EFLAGS: 00000002\nRAX: 0000000000000000 RBX: ffff8880088f5ae8 RCX: 00000000361289f9\nRDX: 0000000000000000 RSI: 0000000000000206 RDI: ffff8880088f5b00\nRBP: ffff8880088f5b00 R08: 0000000000080000 R09: 0000000000000001\nR10: 0000000000000003 R11: 0000000000000001 R12: ffff8880056b6a00\nR13: ffff8880088f5280 R14: 0000000000000001 R15: ffff8880088f5a80\nFS:  0000000000000000(0000) GS:ffff88807dd80000(0000) knlGS:0000000000000000\nCS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000000000000008 CR3: 0000000006314000 CR4: 00000000007506f0\nPKRU: 55555554\nCall Trace:\n <TASK>\n unix_release_sock (net/unix/af_unix.c:654)\n unix_release (net/unix/af_unix.c:1050)\n __sock_release (net/socket.c:660)\n sock_close (net/socket.c:1423)\n __fput (fs/file_table.c:423)\n delayed_fput (fs/file_table.c:444 (discriminator 3))\n process_one_work (kernel/workqueue.c:3259)\n worker_thread (kernel/workqueue.c:3329 kernel/workqueue.c:3416)\n kthread (kernel/kthread.c:388)\n ret_from_fork (arch/x86/kernel/process.c:153)\n ret_from_fork_asm (arch/x86/entry/entry_64.S:257)\n </TASK>\nModules linked in:\nCR2: 0000000000000008",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2590"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.5,
						"vectorString":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2024-36972"
		},
		{
			"cve":"CVE-2024-40954",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nnet: do not leave a dangling sk pointer, when socket creation fails\n\nIt is possible to trigger a use-after-free by:\n  * attaching an fentry probe to __sock_release() and the probe calling the\n    bpf_get_socket_cookie() helper\n  * running traceroute -I 1.1.1.1 on a freshly booted VM\n\nA KASAN enabled kernel will log something like below (decoded and stripped):\n==================================================================\nBUG: KASAN: slab-use-after-free in __sock_gen_cookie (./arch/x86/include/asm/atomic64_64.h:15 ./include/linux/atomic/atomic-arch-fallback.h:2583 ./include/linux/atomic/atomic-instrumented.h:1611 net/core/sock_diag.c:29)\nRead of size 8 at addr ffff888007110dd8 by task traceroute/299\n\nCPU: 2 PID: 299 Comm: traceroute Tainted: G            E      6.10.0-rc2+ #2\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.2-debian-1.16.2-1 04/01/2014\nCall Trace:\n <TASK>\ndump_stack_lvl (lib/dump_stack.c:117 (discriminator 1))\nprint_report (mm/kasan/report.c:378 mm/kasan/report.c:488)\n? __sock_gen_cookie (./arch/x86/include/asm/atomic64_64.h:15 ./include/linux/atomic/atomic-arch-fallback.h:2583 ./include/linux/atomic/atomic-instrumented.h:1611 net/core/sock_diag.c:29)\nkasan_report (mm/kasan/report.c:603)\n? __sock_gen_cookie (./arch/x86/include/asm/atomic64_64.h:15 ./include/linux/atomic/atomic-arch-fallback.h:2583 ./include/linux/atomic/atomic-instrumented.h:1611 net/core/sock_diag.c:29)\nkasan_check_range (mm/kasan/generic.c:183 mm/kasan/generic.c:189)\n__sock_gen_cookie (./arch/x86/include/asm/atomic64_64.h:15 ./include/linux/atomic/atomic-arch-fallback.h:2583 ./include/linux/atomic/atomic-instrumented.h:1611 net/core/sock_diag.c:29)\nbpf_get_socket_ptr_cookie (./arch/x86/include/asm/preempt.h:94 ./include/linux/sock_diag.h:42 net/core/filter.c:5094 net/core/filter.c:5092)\nbpf_prog_875642cf11f1d139___sock_release+0x6e/0x8e\nbpf_trampoline_6442506592+0x47/0xaf\n__sock_release (net/socket.c:652)\n__sock_create (net/socket.c:1601)\n...\nAllocated by task 299 on cpu 2 at 78.328492s:\nkasan_save_stack (mm/kasan/common.c:48)\nkasan_save_track (mm/kasan/common.c:68)\n__kasan_slab_alloc (mm/kasan/common.c:312 mm/kasan/common.c:338)\nkmem_cache_alloc_noprof (mm/slub.c:3941 mm/slub.c:4000 mm/slub.c:4007)\nsk_prot_alloc (net/core/sock.c:2075)\nsk_alloc (net/core/sock.c:2134)\ninet_create (net/ipv4/af_inet.c:327 net/ipv4/af_inet.c:252)\n__sock_create (net/socket.c:1572)\n__sys_socket (net/socket.c:1660 net/socket.c:1644 net/socket.c:1706)\n__x64_sys_socket (net/socket.c:1718)\ndo_syscall_64 (arch/x86/entry/common.c:52 arch/x86/entry/common.c:83)\nentry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:130)\n\nFreed by task 299 on cpu 2 at 78.328502s:\nkasan_save_stack (mm/kasan/common.c:48)\nkasan_save_track (mm/kasan/common.c:68)\nkasan_save_free_info (mm/kasan/generic.c:582)\npoison_slab_object (mm/kasan/common.c:242)\n__kasan_slab_free (mm/kasan/common.c:256)\nkmem_cache_free (mm/slub.c:4437 mm/slub.c:4511)\n__sk_destruct (net/core/sock.c:2117 net/core/sock.c:2208)\ninet_create (net/ipv4/af_inet.c:397 net/ipv4/af_inet.c:252)\n__sock_create (net/socket.c:1572)\n__sys_socket (net/socket.c:1660 net/socket.c:1644 net/socket.c:1706)\n__x64_sys_socket (net/socket.c:1718)\ndo_syscall_64 (arch/x86/entry/common.c:52 arch/x86/entry/common.c:83)\nentry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:130)\n\nFix this by clearing the struct socket reference in sk_common_release() to cover\nall protocol families create functions, which may already attached the\nreference to the sk object with sock_init_data().",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2590"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.8,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2024-40954"
		},
		{
			"cve":"CVE-2024-40958",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nnetns: Make get_net_ns() handle zero refcount net\n\nSyzkaller hit a warning:\nrefcount_t: addition on 0; use-after-free.\nWARNING: CPU: 3 PID: 7890 at lib/refcount.c:25 refcount_warn_saturate+0xdf/0x1d0\nModules linked in:\nCPU: 3 PID: 7890 Comm: tun Not tainted 6.10.0-rc3-00100-gcaa4f9578aba-dirty #310\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 04/01/2014\nRIP: 0010:refcount_warn_saturate+0xdf/0x1d0\nCode: 41 49 04 31 ff 89 de e8 9f 1e cd fe 84 db 75 9c e8 76 26 cd fe c6 05 b6 41 49 04 01 90 48 c7 c7 b8 8e 25 86 e8 d2 05 b5 fe 90 <0f> 0b 90 90 e9 79 ff ff ff e8 53 26 cd fe 0f b6 1\nRSP: 0018:ffff8881067b7da0 EFLAGS: 00010286\nRAX: 0000000000000000 RBX: 0000000000000000 RCX: ffffffff811c72ac\nRDX: ffff8881026a2140 RSI: ffffffff811c72b5 RDI: 0000000000000001\nRBP: ffff8881067b7db0 R08: 0000000000000000 R09: 205b5d3730353139\nR10: 0000000000000000 R11: 205d303938375420 R12: ffff8881086500c4\nR13: ffff8881086500c4 R14: ffff8881086500b0 R15: ffff888108650040\nFS:  00007f5b2961a4c0(0000) GS:ffff88823bd00000(0000) knlGS:0000000000000000\nCS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 000055d7ed36fd18 CR3: 00000001482f6000 CR4: 00000000000006f0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nCall Trace:\n <TASK>\n ? show_regs+0xa3/0xc0\n ? __warn+0xa5/0x1c0\n ? refcount_warn_saturate+0xdf/0x1d0\n ? report_bug+0x1fc/0x2d0\n ? refcount_warn_saturate+0xdf/0x1d0\n ? handle_bug+0xa1/0x110\n ? exc_invalid_op+0x3c/0xb0\n ? asm_exc_invalid_op+0x1f/0x30\n ? __warn_printk+0xcc/0x140\n ? __warn_printk+0xd5/0x140\n ? refcount_warn_saturate+0xdf/0x1d0\n get_net_ns+0xa4/0xc0\n ? __pfx_get_net_ns+0x10/0x10\n open_related_ns+0x5a/0x130\n __tun_chr_ioctl+0x1616/0x2370\n ? __sanitizer_cov_trace_switch+0x58/0xa0\n ? __sanitizer_cov_trace_const_cmp2+0x1c/0x30\n ? __pfx_tun_chr_ioctl+0x10/0x10\n tun_chr_ioctl+0x2f/0x40\n __x64_sys_ioctl+0x11b/0x160\n x64_sys_call+0x1211/0x20d0\n do_syscall_64+0x9e/0x1d0\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\nRIP: 0033:0x7f5b28f165d7\nCode: b3 66 90 48 8b 05 b1 48 2d 00 64 c7 00 26 00 00 00 48 c7 c0 ff ff ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 81 48 2d 00 8\nRSP: 002b:00007ffc2b59c5e8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010\nRAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f5b28f165d7\nRDX: 0000000000000000 RSI: 00000000000054e3 RDI: 0000000000000003\nRBP: 00007ffc2b59c650 R08: 00007f5b291ed8c0 R09: 00007f5b2961a4c0\nR10: 0000000029690010 R11: 0000000000000246 R12: 0000000000400730\nR13: 00007ffc2b59cf40 R14: 0000000000000000 R15: 0000000000000000\n </TASK>\nKernel panic - not syncing: kernel: panic_on_warn set ...\n\nThis is trigger as below:\n          ns0                                    ns1\ntun_set_iff() //dev is tun0\n   tun->dev = dev\n//ip link set tun0 netns ns1\n                                       put_net() //ref is 0\n__tun_chr_ioctl() //TUNGETDEVNETNS\n   net = dev_net(tun->dev);\n   open_related_ns(&net->ns, get_net_ns); //ns1\n     get_net_ns()\n        get_net() //addition on 0\n\nUse maybe_get_net() in get_net_ns in case net's ref is zero to fix this",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2590"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.8,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2024-40958"
		},
		{
			"cve":"CVE-2024-41057",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\ncachefiles: fix slab-use-after-free in cachefiles_withdraw_cookie()\n\nWe got the following issue in our fault injection stress test:\n\n==================================================================\nBUG: KASAN: slab-use-after-free in cachefiles_withdraw_cookie+0x4d9/0x600\nRead of size 8 at addr ffff888118efc000 by task kworker/u78:0/109\n\nCPU: 13 PID: 109 Comm: kworker/u78:0 Not tainted 6.8.0-dirty #566\nCall Trace:\n <TASK>\n kasan_report+0x93/0xc0\n cachefiles_withdraw_cookie+0x4d9/0x600\n fscache_cookie_state_machine+0x5c8/0x1230\n fscache_cookie_worker+0x91/0x1c0\n process_one_work+0x7fa/0x1800\n [...]\n\nAllocated by task 117:\n kmalloc_trace+0x1b3/0x3c0\n cachefiles_acquire_volume+0xf3/0x9c0\n fscache_create_volume_work+0x97/0x150\n process_one_work+0x7fa/0x1800\n [...]\n\nFreed by task 120301:\n kfree+0xf1/0x2c0\n cachefiles_withdraw_cache+0x3fa/0x920\n cachefiles_put_unbind_pincount+0x1f6/0x250\n cachefiles_daemon_release+0x13b/0x290\n __fput+0x204/0xa00\n task_work_run+0x139/0x230\n do_exit+0x87a/0x29b0\n [...]\n==================================================================\n\nFollowing is the process that triggers the issue:\n\n           p1                |             p2\n------------------------------------------------------------\n                              fscache_begin_lookup\n                               fscache_begin_volume_access\n                                fscache_cache_is_live(fscache_cache)\ncachefiles_daemon_release\n cachefiles_put_unbind_pincount\n  cachefiles_daemon_unbind\n   cachefiles_withdraw_cache\n    fscache_withdraw_cache\n     fscache_set_cache_state(cache, FSCACHE_CACHE_IS_WITHDRAWN);\n    cachefiles_withdraw_objects(cache)\n    fscache_wait_for_objects(fscache)\n      atomic_read(&fscache_cache->object_count) == 0\n                              fscache_perform_lookup\n                               cachefiles_lookup_cookie\n                                cachefiles_alloc_object\n                                 refcount_set(&object->ref, 1);\n                                 object->volume = volume\n                                 fscache_count_object(vcookie->cache);\n                                  atomic_inc(&fscache_cache->object_count)\n    cachefiles_withdraw_volumes\n     cachefiles_withdraw_volume\n      fscache_withdraw_volume\n      __cachefiles_free_volume\n       kfree(cachefiles_volume)\n                              fscache_cookie_state_machine\n                               cachefiles_withdraw_cookie\n                                cache = object->volume->cache;\n                                // cachefiles_volume UAF !!!\n\nAfter setting FSCACHE_CACHE_IS_WITHDRAWN, wait for all the cookie lookups\nto complete first, and then wait for fscache_cache->object_count == 0 to\navoid the cookie exiting after the volume has been freed and triggering\nthe above issue. Therefore call fscache_withdraw_volume() before calling\ncachefiles_withdraw_objects().\n\nThis way, after setting FSCACHE_CACHE_IS_WITHDRAWN, only the following two\ncases will occur:\n1) fscache_begin_lookup fails in fscache_begin_volume_access().\n2) fscache_withdraw_volume() will ensure that fscache_count_object() has\n   been executed before calling fscache_wait_for_objects().",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2590"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.8,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2024-41057"
		},
		{
			"cve":"CVE-2024-42159",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: mpi3mr: Sanitise num_phys\n\nInformation is stored in mr_sas_port->phy_mask, values larger then size of\nthis field shouldn't be allowed.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2590"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.8,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2024-42159"
		},
		{
			"cve":"CVE-2024-43873",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nvhost/vsock: always initialize seqpacket_allow\n\nThere are two issues around seqpacket_allow:\n1. seqpacket_allow is not initialized when socket is\n   created. Thus if features are never set, it will be\n   read uninitialized.\n2. if VIRTIO_VSOCK_F_SEQPACKET is set and then cleared,\n   then seqpacket_allow will not be cleared appropriately\n   (existing apps I know about don't usually do this but\n    it's legal and there's no way to be sure no one relies\n    on this).\n\nTo fix:\n\t- initialize seqpacket_allow after allocation\n\t- set it unconditionally in set_features",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2590"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.8,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2024-43873"
		},
		{
			"cve":"CVE-2024-44977",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amdgpu: Validate TA binary size\n\nAdd TA binary size validation to avoid OOB write.\n\n(cherry picked from commit c0a04e3570d72aaf090962156ad085e37c62e442)",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2590"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.8,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2024-44977"
		},
		{
			"cve":"CVE-2024-44983",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: flowtable: validate vlan header\n\nEnsure there is sufficient room to access the protocol field of the\nVLAN header, validate it once before the flowtable lookup.\n\n=====================================================\nBUG: KMSAN: uninit-value in nf_flow_offload_inet_hook+0x45a/0x5f0 net/netfilter/nf_flow_table_inet.c:32\n nf_flow_offload_inet_hook+0x45a/0x5f0 net/netfilter/nf_flow_table_inet.c:32\n nf_hook_entry_hookfn include/linux/netfilter.h:154 [inline]\n nf_hook_slow+0xf4/0x400 net/netfilter/core.c:626\n nf_hook_ingress include/linux/netfilter_netdev.h:34 [inline]\n nf_ingress net/core/dev.c:5440 [inline]",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2590"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.1,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2024-44983"
		},
		{
			"cve":"CVE-2024-44998",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\natm: idt77252: prevent use after free in dequeue_rx()\n\nWe can't dereference \"skb\" after calling vcc->push() because the skb\nis released.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2590"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.8,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2024-44998"
		},
		{
			"cve":"CVE-2024-46746",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nHID: amd_sfh: free driver_data after destroying hid device\n\nHID driver callbacks aren't called anymore once hid_destroy_device() has\nbeen called. Hence, hid driver_data should be freed only after the\nhid_destroy_device() function returned as driver_data is used in several\ncallbacks.\n\nI observed a crash with kernel 6.10.0 on my T14s Gen 3, after enabling\nKASAN to debug memory allocation, I got this output:\n\n  [   13.050438] ==================================================================\n  [   13.054060] BUG: KASAN: slab-use-after-free in amd_sfh_get_report+0x3ec/0x530 [amd_sfh]\n  [   13.054809] psmouse serio1: trackpoint: Synaptics TrackPoint firmware: 0x02, buttons: 3/3\n  [   13.056432] Read of size 8 at addr ffff88813152f408 by task (udev-worker)/479\n\n  [   13.060970] CPU: 5 PID: 479 Comm: (udev-worker) Not tainted 6.10.0-arch1-2 #1 893bb55d7f0073f25c46adbb49eb3785fefd74b0\n  [   13.063978] Hardware name: LENOVO 21CQCTO1WW/21CQCTO1WW, BIOS R22ET70W (1.40 ) 03/21/2024\n  [   13.067860] Call Trace:\n  [   13.069383] input: TPPS/2 Synaptics TrackPoint as /devices/platform/i8042/serio1/input/input8\n  [   13.071486]  <TASK>\n  [   13.071492]  dump_stack_lvl+0x5d/0x80\n  [   13.074870] snd_hda_intel 0000:33:00.6: enabling device (0000 -> 0002)\n  [   13.078296]  ? amd_sfh_get_report+0x3ec/0x530 [amd_sfh 05f43221435b5205f734cd9da29399130f398a38]\n  [   13.082199]  print_report+0x174/0x505\n  [   13.085776]  ? __pfx__raw_spin_lock_irqsave+0x10/0x10\n  [   13.089367]  ? srso_alias_return_thunk+0x5/0xfbef5\n  [   13.093255]  ? amd_sfh_get_report+0x3ec/0x530 [amd_sfh 05f43221435b5205f734cd9da29399130f398a38]\n  [   13.097464]  kasan_report+0xc8/0x150\n  [   13.101461]  ? amd_sfh_get_report+0x3ec/0x530 [amd_sfh 05f43221435b5205f734cd9da29399130f398a38]\n  [   13.105802]  amd_sfh_get_report+0x3ec/0x530 [amd_sfh 05f43221435b5205f734cd9da29399130f398a38]\n  [   13.110303]  amdtp_hid_request+0xb8/0x110 [amd_sfh 05f43221435b5205f734cd9da29399130f398a38]\n  [   13.114879]  ? srso_alias_return_thunk+0x5/0xfbef5\n  [   13.119450]  sensor_hub_get_feature+0x1d3/0x540 [hid_sensor_hub 3f13be3016ff415bea03008d45d99da837ee3082]\n  [   13.124097]  hid_sensor_parse_common_attributes+0x4d0/0xad0 [hid_sensor_iio_common c3a5cbe93969c28b122609768bbe23efe52eb8f5]\n  [   13.127404]  ? srso_alias_return_thunk+0x5/0xfbef5\n  [   13.131925]  ? __pfx_hid_sensor_parse_common_attributes+0x10/0x10 [hid_sensor_iio_common c3a5cbe93969c28b122609768bbe23efe52eb8f5]\n  [   13.136455]  ? _raw_spin_lock_irqsave+0x96/0xf0\n  [   13.140197]  ? __pfx__raw_spin_lock_irqsave+0x10/0x10\n  [   13.143602]  ? devm_iio_device_alloc+0x34/0x50 [industrialio 3d261d5e5765625d2b052be40e526d62b1d2123b]\n  [   13.147234]  ? srso_alias_return_thunk+0x5/0xfbef5\n  [   13.150446]  ? __devm_add_action+0x167/0x1d0\n  [   13.155061]  hid_gyro_3d_probe+0x120/0x7f0 [hid_sensor_gyro_3d 63da36a143b775846ab2dbb86c343b401b5e3172]\n  [   13.158581]  ? srso_alias_return_thunk+0x5/0xfbef5\n  [   13.161814]  platform_probe+0xa2/0x150\n  [   13.165029]  really_probe+0x1e3/0x8a0\n  [   13.168243]  __driver_probe_device+0x18c/0x370\n  [   13.171500]  driver_probe_device+0x4a/0x120\n  [   13.175000]  __driver_attach+0x190/0x4a0\n  [   13.178521]  ? __pfx___driver_attach+0x10/0x10\n  [   13.181771]  bus_for_each_dev+0x106/0x180\n  [   13.185033]  ? __pfx__raw_spin_lock+0x10/0x10\n  [   13.188229]  ? __pfx_bus_for_each_dev+0x10/0x10\n  [   13.191446]  ? srso_alias_return_thunk+0x5/0xfbef5\n  [   13.194382]  bus_add_driver+0x29e/0x4d0\n  [   13.197328]  driver_register+0x1a5/0x360\n  [   13.200283]  ? __pfx_hid_gyro_3d_platform_driver_init+0x10/0x10 [hid_sensor_gyro_3d 63da36a143b775846ab2dbb86c343b401b5e3172]\n  [   13.203362]  do_one_initcall+0xa7/0x380\n  [   13.206432]  ? __pfx_do_one_initcall+0x10/0x10\n  [   13.210175]  ? srso_alias_return_thunk+0x5/0xfbef5\n  [   13.213211]  ? kasan_unpoison+0x44/0x70\n  [   13.216688]  do_init_module+0x238/0x750\n  [   13.2196\n---truncated---",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2590"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.8,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2024-46746"
		},
		{
			"cve":"CVE-2024-49853",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nfirmware: arm_scmi: Fix double free in OPTEE transport\n\nChannels can be shared between protocols, avoid freeing the same channel\ndescriptors twice when unloading the stack.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2590"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.8,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2024-49853"
		},
		{
			"cve":"CVE-2024-49986",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nplatform/x86: x86-android-tablets: Fix use after free on platform_device_register() errors\n\nx86_android_tablet_remove() frees the pdevs[] array, so it should not\nbe used after calling x86_android_tablet_remove().\n\nWhen platform_device_register() fails, store the pdevs[x] PTR_ERR() value\ninto the local ret variable before calling x86_android_tablet_remove()\nto avoid using pdevs[] after it has been freed.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2590"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.8,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2024-49986"
		},
		{
			"cve":"CVE-2024-50121",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nnfsd: cancel nfsd_shrinker_work using sync mode in nfs4_state_shutdown_net\n\nIn the normal case, when we excute `echo 0 > /proc/fs/nfsd/threads`, the\nfunction `nfs4_state_destroy_net` in `nfs4_state_shutdown_net` will\nrelease all resources related to the hashed `nfs4_client`. If the\n`nfsd_client_shrinker` is running concurrently, the `expire_client`\nfunction will first unhash this client and then destroy it. This can\nlead to the following warning. Additionally, numerous use-after-free\nerrors may occur as well.\n\nnfsd_client_shrinker         echo 0 > /proc/fs/nfsd/threads\n\nexpire_client                nfsd_shutdown_net\n  unhash_client                ...\n                               nfs4_state_shutdown_net\n                                 /* won't wait shrinker exit */\n  /*                             cancel_work(&nn->nfsd_shrinker_work)\n   * nfsd_file for this          /* won't destroy unhashed client1 */\n   * client1 still alive         nfs4_state_destroy_net\n   */\n\n                               nfsd_file_cache_shutdown\n                                 /* trigger warning */\n                                 kmem_cache_destroy(nfsd_file_slab)\n                                 kmem_cache_destroy(nfsd_file_mark_slab)\n  /* release nfsd_file and mark */\n  __destroy_client\n\n====================================================================\nBUG nfsd_file (Not tainted): Objects remaining in nfsd_file on\n__kmem_cache_shutdown()\n--------------------------------------------------------------------\nCPU: 4 UID: 0 PID: 764 Comm: sh Not tainted 6.12.0-rc3+ #1\n\n dump_stack_lvl+0x53/0x70\n slab_err+0xb0/0xf0\n __kmem_cache_shutdown+0x15c/0x310\n kmem_cache_destroy+0x66/0x160\n nfsd_file_cache_shutdown+0xac/0x210 [nfsd]\n nfsd_destroy_serv+0x251/0x2a0 [nfsd]\n nfsd_svc+0x125/0x1e0 [nfsd]\n write_threads+0x16a/0x2a0 [nfsd]\n nfsctl_transaction_write+0x74/0xa0 [nfsd]\n vfs_write+0x1a5/0x6d0\n ksys_write+0xc1/0x160\n do_syscall_64+0x5f/0x170\n entry_SYSCALL_64_after_hwframe+0x76/0x7e\n\n====================================================================\nBUG nfsd_file_mark (Tainted: G    B   W         ): Objects remaining\nnfsd_file_mark on __kmem_cache_shutdown()\n--------------------------------------------------------------------\n\n dump_stack_lvl+0x53/0x70\n slab_err+0xb0/0xf0\n __kmem_cache_shutdown+0x15c/0x310\n kmem_cache_destroy+0x66/0x160\n nfsd_file_cache_shutdown+0xc8/0x210 [nfsd]\n nfsd_destroy_serv+0x251/0x2a0 [nfsd]\n nfsd_svc+0x125/0x1e0 [nfsd]\n write_threads+0x16a/0x2a0 [nfsd]\n nfsctl_transaction_write+0x74/0xa0 [nfsd]\n vfs_write+0x1a5/0x6d0\n ksys_write+0xc1/0x160\n do_syscall_64+0x5f/0x170\n entry_SYSCALL_64_after_hwframe+0x76/0x7e\n\nTo resolve this issue, cancel `nfsd_shrinker_work` using synchronous\nmode in nfs4_state_shutdown_net.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2590"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.8,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2024-50121"
		},
		{
			"cve":"CVE-2024-50125",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: SCO: Fix UAF on sco_sock_timeout\n\nconn->sk maybe have been unlinked/freed while waiting for sco_conn_lock\nso this checks if the conn->sk is still valid by checking if it part of\nsco_sk_list.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2590"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.8,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2024-50125"
		},
		{
			"cve":"CVE-2024-50280",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\ndm cache: fix flushing uninitialized delayed_work on cache_ctr error\n\nAn unexpected WARN_ON from flush_work() may occur when cache creation\nfails, caused by destroying the uninitialized delayed_work waker in the\nerror path of cache_create(). For example, the warning appears on the\nsuperblock checksum error.\n\nReproduce steps:\n\ndmsetup create cmeta --table \"0 8192 linear /dev/sdc 0\"\ndmsetup create cdata --table \"0 65536 linear /dev/sdc 8192\"\ndmsetup create corig --table \"0 524288 linear /dev/sdc 262144\"\ndd if=/dev/urandom of=/dev/mapper/cmeta bs=4k count=1 oflag=direct\ndmsetup create cache --table \"0 524288 cache /dev/mapper/cmeta \\\n/dev/mapper/cdata /dev/mapper/corig 128 2 metadata2 writethrough smq 0\"\n\nKernel logs:\n\n(snip)\nWARNING: CPU: 0 PID: 84 at kernel/workqueue.c:4178 __flush_work+0x5d4/0x890\n\nFix by pulling out the cancel_delayed_work_sync() from the constructor's\nerror path. This patch doesn't affect the use-after-free fix for\nconcurrent dm_resume and dm_destroy (commit 6a459d8edbdb (\"dm cache: Fix\nUAF in destroy()\")) as cache_dtr is not changed.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2590"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.8,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2024-50280"
		},
		{
			"cve":"CVE-2024-53070",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nusb: dwc3: fix fault at system suspend if device was already runtime suspended\n\nIf the device was already runtime suspended then during system suspend\nwe cannot access the device registers else it will crash.\n\nAlso we cannot access any registers after dwc3_core_exit() on some\nplatforms so move the dwc3_enable_susphy() call to the top.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2590"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-53070"
		},
		{
			"cve":"CVE-2024-53095",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nsmb: client: Fix use-after-free of network namespace.\n\nRecently, we got a customer report that CIFS triggers oops while\nreconnecting to a server.  [0]\n\nThe workload runs on Kubernetes, and some pods mount CIFS servers\nin non-root network namespaces.  The problem rarely happened, but\nit was always while the pod was dying.\n\nThe root cause is wrong reference counting for network namespace.\n\nCIFS uses kernel sockets, which do not hold refcnt of the netns that\nthe socket belongs to.  That means CIFS must ensure the socket is\nalways freed before its netns; otherwise, use-after-free happens.\n\nThe repro steps are roughly:\n\n  1. mount CIFS in a non-root netns\n  2. drop packets from the netns\n  3. destroy the netns\n  4. unmount CIFS\n\nWe can reproduce the issue quickly with the script [1] below and see\nthe splat [2] if CONFIG_NET_NS_REFCNT_TRACKER is enabled.\n\nWhen the socket is TCP, it is hard to guarantee the netns lifetime\nwithout holding refcnt due to async timers.\n\nLet's hold netns refcnt for each socket as done for SMC in commit\n9744d2bf1976 (\"smc: Fix use-after-free in tcp_write_timer_handler().\").\n\nNote that we need to move put_net() from cifs_put_tcp_session() to\nclean_demultiplex_info(); otherwise, __sock_create() still could touch a\nfreed netns while cifsd tries to reconnect from cifs_demultiplex_thread().\n\nAlso, maybe_get_net() cannot be put just before __sock_create() because\nthe code is not under RCU and there is a small chance that the same\naddress happened to be reallocated to another netns.\n\n[0]:\nCIFS: VFS: \\\\XXXXXXXXXXX has not responded in 15 seconds. Reconnecting...\nCIFS: Serverclose failed 4 times, giving up\nUnable to handle kernel paging request at virtual address 14de99e461f84a07\nMem abort info:\n  ESR = 0x0000000096000004\n  EC = 0x25: DABT (current EL), IL = 32 bits\n  SET = 0, FnV = 0\n  EA = 0, S1PTW = 0\n  FSC = 0x04: level 0 translation fault\nData abort info:\n  ISV = 0, ISS = 0x00000004\n  CM = 0, WnR = 0\n[14de99e461f84a07] address between user and kernel address ranges\nInternal error: Oops: 0000000096000004 [#1] SMP\nModules linked in: cls_bpf sch_ingress nls_utf8 cifs cifs_arc4 cifs_md4 dns_resolver tcp_diag inet_diag veth xt_state xt_connmark nf_conntrack_netlink xt_nat xt_statistic xt_MASQUERADE xt_mark xt_addrtype ipt_REJECT nf_reject_ipv4 nft_chain_nat nf_nat xt_conntrack nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 xt_comment nft_compat nf_tables nfnetlink overlay nls_ascii nls_cp437 sunrpc vfat fat aes_ce_blk aes_ce_cipher ghash_ce sm4_ce_cipher sm4 sm3_ce sm3 sha3_ce sha512_ce sha512_arm64 sha1_ce ena button sch_fq_codel loop fuse configfs dmi_sysfs sha2_ce sha256_arm64 dm_mirror dm_region_hash dm_log dm_mod dax efivarfs\nCPU: 5 PID: 2690970 Comm: cifsd Not tainted 6.1.103-109.184.amzn2023.aarch64 #1\nHardware name: Amazon EC2 r7g.4xlarge/, BIOS 1.0 11/1/2018\npstate: 00400005 (nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)\npc : fib_rules_lookup+0x44/0x238\nlr : __fib_lookup+0x64/0xbc\nsp : ffff8000265db790\nx29: ffff8000265db790 x28: 0000000000000000 x27: 000000000000bd01\nx26: 0000000000000000 x25: ffff000b4baf8000 x24: ffff00047b5e4580\nx23: ffff8000265db7e0 x22: 0000000000000000 x21: ffff00047b5e4500\nx20: ffff0010e3f694f8 x19: 14de99e461f849f7 x18: 0000000000000000\nx17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000\nx14: 0000000000000000 x13: 0000000000000000 x12: 3f92800abd010002\nx11: 0000000000000001 x10: ffff0010e3f69420 x9 : ffff800008a6f294\nx8 : 0000000000000000 x7 : 0000000000000006 x6 : 0000000000000000\nx5 : 0000000000000001 x4 : ffff001924354280 x3 : ffff8000265db7e0\nx2 : 0000000000000000 x1 : ffff0010e3f694f8 x0 : ffff00047b5e4500\nCall trace:\n fib_rules_lookup+0x44/0x238\n __fib_lookup+0x64/0xbc\n ip_route_output_key_hash_rcu+0x2c4/0x398\n ip_route_output_key_hash+0x60/0x8c\n tcp_v4_connect+0x290/0x488\n __inet_stream_connect+0x108/0x3d0\n inet_stream_connect+0x50/0x78\n kernel_connect+0x6c/0xac\n generic_ip_conne\n---truncated---",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2590"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.8,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2024-53095"
		},
		{
			"cve":"CVE-2024-53108",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Adjust VSDB parser for replay feature\n\nAt some point, the IEEE ID identification for the replay check in the\nAMD EDID was added. However, this check causes the following\nout-of-bounds issues when using KASAN:\n\n[   27.804016] BUG: KASAN: slab-out-of-bounds in amdgpu_dm_update_freesync_caps+0xefa/0x17a0 [amdgpu]\n[   27.804788] Read of size 1 at addr ffff8881647fdb00 by task systemd-udevd/383\n\n...\n\n[   27.821207] Memory state around the buggy address:\n[   27.821215]  ffff8881647fda00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00\n[   27.821224]  ffff8881647fda80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00\n[   27.821234] >ffff8881647fdb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[   27.821243]                    ^\n[   27.821250]  ffff8881647fdb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[   27.821259]  ffff8881647fdc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00\n[   27.821268] ==================================================================\n\nThis is caused because the ID extraction happens outside of the range of\nthe edid lenght. This commit addresses this issue by considering the\namd_vsdb_block size.\n\n(cherry picked from commit b7e381b1ccd5e778e3d9c44c669ad38439a861d8)",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2590"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.1,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2024-53108"
		},
		{
			"cve":"CVE-2024-53129",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/rockchip: vop: Fix a dereferenced before check warning\n\nThe 'state' can't be NULL, we should check crtc_state.\n\nFix warning:\ndrivers/gpu/drm/rockchip/rockchip_drm_vop.c:1096\nvop_plane_atomic_async_check() warn: variable dereferenced before check\n'state' (see line 1077)",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2590"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-53129"
		},
		{
			"cve":"CVE-2024-53142",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\ninitramfs: avoid filename buffer overrun\n\nThe initramfs filename field is defined in\nDocumentation/driver-api/early-userspace/buffer-format.rst as:\n\n 37 cpio_file := ALGN(4) + cpio_header + filename + \"\\0\" + ALGN(4) + data\n...\n 55 ============= ================== =========================\n 56 Field name    Field size         Meaning\n 57 ============= ================== =========================\n...\n 70 c_namesize    8 bytes            Length of filename, including final \\0\n\nWhen extracting an initramfs cpio archive, the kernel's do_name() path\nhandler assumes a zero-terminated path at @collected, passing it\ndirectly to filp_open() / init_mkdir() / init_mknod().\n\nIf a specially crafted cpio entry carries a non-zero-terminated filename\nand is followed by uninitialized memory, then a file may be created with\ntrailing characters that represent the uninitialized memory. The ability\nto create an initramfs entry would imply already having full control of\nthe system, so the buffer overrun shouldn't be considered a security\nvulnerability.\n\nAppend the output of the following bash script to an existing initramfs\nand observe any created /initramfs_test_fname_overrunAA* path. E.g.\n  ./reproducer.sh | gzip >> /myinitramfs\n\nIt's easiest to observe non-zero uninitialized memory when the output is\ngzipped, as it'll overflow the heap allocated @out_buf in __gunzip(),\nrather than the initrd_start+initrd_size block.\n\n---- reproducer.sh ----\nnilchar=\"A\"\t# change to \"\\0\" to properly zero terminate / pad\nmagic=\"070701\"\nino=1\nmode=$(( 0100777 ))\nuid=0\ngid=0\nnlink=1\nmtime=1\nfilesize=0\ndevmajor=0\ndevminor=1\nrdevmajor=0\nrdevminor=0\ncsum=0\nfname=\"initramfs_test_fname_overrun\"\nnamelen=$(( ${#fname} + 1 ))\t# plus one to account for terminator\n\nprintf \"%s%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%s\" \\\n\t$magic $ino $mode $uid $gid $nlink $mtime $filesize \\\n\t$devmajor $devminor $rdevmajor $rdevminor $namelen $csum $fname\n\ntermpadlen=$(( 1 + ((4 - ((110 + $namelen) & 3)) % 4) ))\nprintf \"%.s${nilchar}\" $(seq 1 $termpadlen)\n---- reproducer.sh ----\n\nSymlink filename fields handled in do_symlink() won't overrun past the\ndata segment, due to the explicit zero-termination of the symlink\ntarget.\n\nFix filename buffer overrun by aborting the initramfs FSM if any cpio\nentry doesn't carry a zero-terminator at the expected (name_len - 1)\noffset.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2590"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.8,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-72.0.0.64.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-72.0.0.64.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-72.0.0.64.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2024-53142"
		}
	]
}