{
	"document":{
		"aggregate_severity":{
			"namespace":"https://nvd.nist.gov/vuln-metrics/cvss",
			"text":"High"
		},
		"category":"csaf_vex",
		"csaf_version":"2.0",
		"distribution":{
			"tlp":{
				"label":"WHITE",
				"url":"https:/www.first.org/tlp/"
			}
		},
		"lang":"en",
		"notes":[
			{
				"text":"kernel security update",
				"category":"general",
				"title":"Synopsis"
			},
			{
				"text":"An update for kernel is now available for openEuler-22.03-LTS-SP1",
				"category":"general",
				"title":"Summary"
			},
			{
				"text":"The Linux Kernel, the operating system core itself.\n\nSecurity Fix(es):\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\ndmaengine: idxd: Let probe fail when workqueue cannot be enabled\n\nThe workqueue is enabled when the appropriate driver is loaded and\ndisabled when the driver is removed. When the driver is removed it\nassumes that the workqueue was enabled successfully and proceeds to\nfree allocations made during workqueue enabling.\n\nFailure during workqueue enabling does not prevent the driver from\nbeing loaded. This is because the error path within drv_enable_wq()\nreturns success unless a second failure is encountered\nduring the error path. By returning success it is possible to load\nthe driver even if the workqueue cannot be enabled and\nallocations that do not exist are attempted to be freed during\ndriver remove.\n\nSome examples of problematic flows:\n(a)\n\n idxd_dmaengine_drv_probe() -> drv_enable_wq() -> idxd_wq_request_irq():\n In above flow, if idxd_wq_request_irq() fails then\n idxd_wq_unmap_portal() is called on error exit path, but\n drv_enable_wq() returns 0 because idxd_wq_disable() succeeds. The\n driver is thus loaded successfully.\n\n idxd_dmaengine_drv_remove()->drv_disable_wq()->idxd_wq_unmap_portal()\n Above flow on driver unload triggers the WARN in devm_iounmap() because\n the device resource has already been removed during error path of\n drv_enable_wq().\n\n(b)\n\n idxd_dmaengine_drv_probe() -> drv_enable_wq() -> idxd_wq_request_irq():\n In above flow, if idxd_wq_request_irq() fails then\n idxd_wq_init_percpu_ref() is never called to initialize the percpu\n counter, yet the driver loads successfully because drv_enable_wq()\n returns 0.\n\n idxd_dmaengine_drv_remove()->__idxd_wq_quiesce()->percpu_ref_kill():\n Above flow on driver unload triggers a BUG when attempting to drop the\n initial ref of the uninitialized percpu ref:\n BUG: kernel NULL pointer dereference, address: 0000000000000010\n\nFix the drv_enable_wq() error path by returning the original error that\nindicates failure of workqueue enabling. This ensures that the probe\nfails when an error is encountered and the driver remove paths are only\nattempted when the workqueue was enabled successfully.(CVE-2022-48868)\n\nIn the Linux kernel, the following vulnerability has been resolved:  igb: Initialize mailbox message for VF reset  When a MAC address is not assigned to the VF, that portion of the message sent to the VF is not set. The memory, however, is allocated from the stack meaning that information may be leaked to the VM. Initialize the message buffer to 0 so that no information is passed to the VM in this case.(CVE-2022-48949)\n\nIn the Linux kernel, the following vulnerability has been resolved:  Bluetooth: Fix not cleanup led when bt_init fails  bt_init() calls bt_leds_init() to register led, but if it fails later, bt_leds_cleanup() is not called to unregister it.  This can cause panic if the argument \"bluetooth-power\" in text is freed and then another led_trigger_register() tries to access it:  BUG: unable to handle page fault for address: ffffffffc06d3bc0 RIP: 0010:strcmp+0xc/0x30   Call Trace:     <TASK>     led_trigger_register+0x10d/0x4f0     led_trigger_register_simple+0x7d/0x100     bt_init+0x39/0xf7 [bluetooth]     do_one_initcall+0xd0/0x4e0(CVE-2022-48971)\n\nIn the Linux kernel, the following vulnerability has been resolved:  net: tun: Fix use-after-free in tun_detach()  syzbot reported use-after-free in tun_detach() [1].  This causes call trace like below:  ================================================================== BUG: KASAN: use-after-free in notifier_call_chain+0x1ee/0x200 kernel/notifier.c:75 Read of size 8 at addr ffff88807324e2a8 by task syz-executor.0/3673  CPU: 0 PID: 3673 Comm: syz-executor.0 Not tainted 6.1.0-rc5-syzkaller-00044-gcc675d22e422 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 Call Trace:  <TASK>  __dump_stack lib/dump_stack.c:88 [inline]  dump_stack_lvl+0xd1/0x138 lib/dump_stack.c:106  print_address_description mm/kasan/report.c:284 [inline]  print_report+0x15e/0x461 mm/kasan/report.c:395  kasan_report+0xbf/0x1f0 mm/kasan/report.c:495  notifier_call_chain+0x1ee/0x200 kernel/notifier.c:75  call_netdevice_notifiers_info+0x86/0x130 net/core/dev.c:1942  call_netdevice_notifiers_extack net/core/dev.c:1983 [inline]  call_netdevice_notifiers net/core/dev.c:1997 [inline]  netdev_wait_allrefs_any net/core/dev.c:10237 [inline]  netdev_run_todo+0xbc6/0x1100 net/core/dev.c:10351  tun_detach drivers/net/tun.c:704 [inline]  tun_chr_close+0xe4/0x190 drivers/net/tun.c:3467  __fput+0x27c/0xa90 fs/file_table.c:320  task_work_run+0x16f/0x270 kernel/task_work.c:179  exit_task_work include/linux/task_work.h:38 [inline]  do_exit+0xb3d/0x2a30 kernel/exit.c:820  do_group_exit+0xd4/0x2a0 kernel/exit.c:950  get_signal+0x21b1/0x2440 kernel/signal.c:2858  arch_do_signal_or_restart+0x86/0x2300 arch/x86/kernel/signal.c:869  exit_to_user_mode_loop kernel/entry/common.c:168 [inline]  exit_to_user_mode_prepare+0x15f/0x250 kernel/entry/common.c:203  __syscall_exit_to_user_mode_work kernel/entry/common.c:285 [inline]  syscall_exit_to_user_mode+0x1d/0x50 kernel/entry/common.c:296  do_syscall_64+0x46/0xb0 arch/x86/entry/common.c:86  entry_SYSCALL_64_after_hwframe+0x63/0xcd  The cause of the issue is that sock_put() from __tun_detach() drops last reference count for struct net, and then notifier_call_chain() from netdev_state_change() accesses that struct net.  This patch fixes the issue by calling sock_put() from tun_detach() after all necessary accesses for the struct net has done.(CVE-2022-49014)\n\nIn the Linux kernel, the following vulnerability has been resolved:  net: hsr: Fix potential use-after-free  The skb is delivered to netif_rx() which may free it, after calling this, dereferencing skb may trigger use-after-free.(CVE-2022-49015)\n\nIn the Linux kernel, the following vulnerability has been resolved:  wifi: mac8021: fix possible oob access in ieee80211_get_rate_duration  Fix possible out-of-bound access in ieee80211_get_rate_duration routine as reported by the following UBSAN report:  UBSAN: array-index-out-of-bounds in net/mac80211/airtime.c:455:47 index 15 is out of range for type 'u16 [12]' CPU: 2 PID: 217 Comm: kworker/u32:10 Not tainted 6.1.0-060100rc3-generic Hardware name: Acer Aspire TC-281/Aspire TC-281, BIOS R01-A2 07/18/2017 Workqueue: mt76 mt76u_tx_status_data [mt76_usb] Call Trace:  <TASK>  show_stack+0x4e/0x61  dump_stack_lvl+0x4a/0x6f  dump_stack+0x10/0x18  ubsan_epilogue+0x9/0x43  __ubsan_handle_out_of_bounds.cold+0x42/0x47 ieee80211_get_rate_duration.constprop.0+0x22f/0x2a0 [mac80211]  ? ieee80211_tx_status_ext+0x32e/0x640 [mac80211]  ieee80211_calc_rx_airtime+0xda/0x120 [mac80211]  ieee80211_calc_tx_airtime+0xb4/0x100 [mac80211]  mt76x02_send_tx_status+0x266/0x480 [mt76x02_lib]  mt76x02_tx_status_data+0x52/0x80 [mt76x02_lib]  mt76u_tx_status_data+0x67/0xd0 [mt76_usb]  process_one_work+0x225/0x400  worker_thread+0x50/0x3e0  ? process_one_work+0x400/0x400  kthread+0xe9/0x110  ? kthread_complete_and_exit+0x20/0x20  ret_from_fork+0x22/0x30(CVE-2022-49022)\n\nIn the Linux kernel, the following vulnerability has been resolved:  ixgbevf: Fix resource leak in ixgbevf_init_module()  ixgbevf_init_module() won't destroy the workqueue created by create_singlethread_workqueue() when pci_register_driver() failed. Add destroy_workqueue() in fail path to prevent the resource leak.  Similar to the handling of u132_hcd_init in commit f276e002793c (\"usb: u132-hcd: fix resource leak\")(CVE-2022-49028)\n\nIn the Linux kernel, the following vulnerability has been resolved:  can: bcm: Fix UAF in bcm_proc_show()  BUG: KASAN: slab-use-after-free in bcm_proc_show+0x969/0xa80 Read of size 8 at addr ffff888155846230 by task cat/7862  CPU: 1 PID: 7862 Comm: cat Not tainted 6.5.0-rc1-00153-gc8746099c197 #230 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 04/01/2014 Call Trace:  <TASK>  dump_stack_lvl+0xd5/0x150  print_report+0xc1/0x5e0  kasan_report+0xba/0xf0  bcm_proc_show+0x969/0xa80  seq_read_iter+0x4f6/0x1260  seq_read+0x165/0x210  proc_reg_read+0x227/0x300  vfs_read+0x1d5/0x8d0  ksys_read+0x11e/0x240  do_syscall_64+0x35/0xb0  entry_SYSCALL_64_after_hwframe+0x63/0xcd  Allocated by task 7846:  kasan_save_stack+0x1e/0x40  kasan_set_track+0x21/0x30  __kasan_kmalloc+0x9e/0xa0  bcm_sendmsg+0x264b/0x44e0  sock_sendmsg+0xda/0x180  ____sys_sendmsg+0x735/0x920  ___sys_sendmsg+0x11d/0x1b0  __sys_sendmsg+0xfa/0x1d0  do_syscall_64+0x35/0xb0  entry_SYSCALL_64_after_hwframe+0x63/0xcd  Freed by task 7846:  kasan_save_stack+0x1e/0x40  kasan_set_track+0x21/0x30  kasan_save_free_info+0x27/0x40  ____kasan_slab_free+0x161/0x1c0  slab_free_freelist_hook+0x119/0x220  __kmem_cache_free+0xb4/0x2e0  rcu_core+0x809/0x1bd0  bcm_op is freed before procfs entry be removed in bcm_release(), this lead to bcm_proc_show() may read the freed bcm_op.(CVE-2023-52922)\n\nA flaw was found in the Linux kernel's NVMe driver. This issue may allow an unauthenticated malicious actor to send a set of crafted TCP packages when using NVMe over TCP, leading the NVMe driver to a NULL pointer dereference in the NVMe driver and causing kernel panic and a denial of service.(CVE-2023-6356)\n\nA flaw was found in the Linux kernel's NVMe driver. This issue may allow an unauthenticated malicious actor to send a set of crafted TCP packages when using NVMe over TCP, leading the NVMe driver to a NULL pointer dereference in the NVMe driver, causing kernel panic and a denial of service.(CVE-2023-6535)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nice: protect XDP configuration with a mutex\n\nThe main threat to data consistency in ice_xdp() is a possible asynchronous\nPF reset. It can be triggered by a user or by TX timeout handler.\n\nXDP setup and PF reset code access the same resources in the following\nsections:\n* ice_vsi_close() in ice_prepare_for_reset() - already rtnl-locked\n* ice_vsi_rebuild() for the PF VSI - not protected\n* ice_vsi_open() - already rtnl-locked\n\nWith an unfortunate timing, such accesses can result in a crash such as the\none below:\n\n[ +1.999878] ice 0000:b1:00.0: Registered XDP mem model MEM_TYPE_XSK_BUFF_POOL on Rx ring 14\n[ +2.002992] ice 0000:b1:00.0: Registered XDP mem model MEM_TYPE_XSK_BUFF_POOL on Rx ring 18\n[Mar15 18:17] ice 0000:b1:00.0 ens801f0np0: NETDEV WATCHDOG: CPU: 38: transmit queue 14 timed out 80692736 ms\n[ +0.000093] ice 0000:b1:00.0 ens801f0np0: tx_timeout: VSI_num: 6, Q 14, NTC: 0x0, HW_HEAD: 0x0, NTU: 0x0, INT: 0x4000001\n[ +0.000012] ice 0000:b1:00.0 ens801f0np0: tx_timeout recovery level 1, txqueue 14\n[ +0.394718] ice 0000:b1:00.0: PTP reset successful\n[ +0.006184] BUG: kernel NULL pointer dereference, address: 0000000000000098\n[ +0.000045] #PF: supervisor read access in kernel mode\n[ +0.000023] #PF: error_code(0x0000) - not-present page\n[ +0.000023] PGD 0 P4D 0\n[ +0.000018] Oops: 0000 [#1] PREEMPT SMP NOPTI\n[ +0.000023] CPU: 38 PID: 7540 Comm: kworker/38:1 Not tainted 6.8.0-rc7 #1\n[ +0.000031] Hardware name: Intel Corporation S2600WFT/S2600WFT, BIOS SE5C620.86B.02.01.0014.082620210524 08/26/2021\n[ +0.000036] Workqueue: ice ice_service_task [ice]\n[ +0.000183] RIP: 0010:ice_clean_tx_ring+0xa/0xd0 [ice]\n[...]\n[ +0.000013] Call Trace:\n[ +0.000016] <TASK>\n[ +0.000014] ? __die+0x1f/0x70\n[ +0.000029] ? page_fault_oops+0x171/0x4f0\n[ +0.000029] ? schedule+0x3b/0xd0\n[ +0.000027] ? exc_page_fault+0x7b/0x180\n[ +0.000022] ? asm_exc_page_fault+0x22/0x30\n[ +0.000031] ? ice_clean_tx_ring+0xa/0xd0 [ice]\n[ +0.000194] ice_free_tx_ring+0xe/0x60 [ice]\n[ +0.000186] ice_destroy_xdp_rings+0x157/0x310 [ice]\n[ +0.000151] ice_vsi_decfg+0x53/0xe0 [ice]\n[ +0.000180] ice_vsi_rebuild+0x239/0x540 [ice]\n[ +0.000186] ice_vsi_rebuild_by_type+0x76/0x180 [ice]\n[ +0.000145] ice_rebuild+0x18c/0x840 [ice]\n[ +0.000145] ? delay_tsc+0x4a/0xc0\n[ +0.000022] ? delay_tsc+0x92/0xc0\n[ +0.000020] ice_do_reset+0x140/0x180 [ice]\n[ +0.000886] ice_service_task+0x404/0x1030 [ice]\n[ +0.000824] process_one_work+0x171/0x340\n[ +0.000685] worker_thread+0x277/0x3a0\n[ +0.000675] ? preempt_count_add+0x6a/0xa0\n[ +0.000677] ? _raw_spin_lock_irqsave+0x23/0x50\n[ +0.000679] ? __pfx_worker_thread+0x10/0x10\n[ +0.000653] kthread+0xf0/0x120\n[ +0.000635] ? __pfx_kthread+0x10/0x10\n[ +0.000616] ret_from_fork+0x2d/0x50\n[ +0.000612] ? __pfx_kthread+0x10/0x10\n[ +0.000604] ret_from_fork_asm+0x1b/0x30\n[ +0.000604] </TASK>\n\nThe previous way of handling this through returning -EBUSY is not viable,\nparticularly when destroying AF_XDP socket, because the kernel proceeds\nwith removal anyway.\n\nThere is plenty of code between those calls and there is no need to create\na large critical section that covers all of them, same as there is no need\nto protect ice_vsi_rebuild() with rtnl_lock().\n\nAdd xdp_state_lock mutex to protect ice_vsi_rebuild() and ice_xdp().\n\nLeaving unprotected sections in between would result in two states that\nhave to be considered:\n1. when the VSI is closed, but not yet rebuild\n2. when VSI is already rebuild, but not yet open\n\nThe latter case is actually already handled through !netif_running() case,\nwe just need to adjust flag checking a little. The former one is not as\ntrivial, because between ice_vsi_close() and ice_vsi_rebuild(), a lot of\nhardware interaction happens, this can make adding/deleting rings exit\nwith an error. Luckily, VSI rebuild is pending and can apply new\nconfiguration for us in a managed fashion.\n\nTherefore, add an additional VSI state flag ICE_VSI_REBUILD_PENDING to\nindicate that ice_x\n---truncated---(CVE-2024-46765)\n\nIn the Linux kernel, the following vulnerability has been resolved:  ksmbd: fix user-after-free from session log off  There is racy issue between smb2 session log off and smb2 session setup. It will cause user-after-free from session log off. This add session_lock when setting SMB2_SESSION_EXPIRED and referece count to session struct not to free session while it is being used.(CVE-2024-50086)\n\nIn the Linux kernel, the following vulnerability has been resolved:  ocfs2: pass u64 to ocfs2_truncate_inline maybe overflow  Syzbot reported a kernel BUG in ocfs2_truncate_inline.  There are two reasons for this: first, the parameter value passed is greater than ocfs2_max_inline_data_with_xattr, second, the start and end parameters of ocfs2_truncate_inline are \"unsigned int\".  So, we need to add a sanity check for byte_start and byte_len right before ocfs2_truncate_inline() in ocfs2_remove_inode_range(), if they are greater than ocfs2_max_inline_data_with_xattr return -EINVAL.(CVE-2024-50218)\n\nIn the Linux kernel, the following vulnerability has been resolved:  initramfs: avoid filename buffer overrun  The initramfs filename field is defined in Documentation/driver-api/early-userspace/buffer-format.rst as:   37 cpio_file := ALGN(4) + cpio_header + filename + \"\\0\" + ALGN(4) + data ...  55 ============= ================== =========================  56 Field name    Field size         Meaning  57 ============= ================== ========================= ...  70 c_namesize    8 bytes            Length of filename, including final \\0  When extracting an initramfs cpio archive, the kernel's do_name() path handler assumes a zero-terminated path at @collected, passing it directly to filp_open() / init_mkdir() / init_mknod().  If a specially crafted cpio entry carries a non-zero-terminated filename and is followed by uninitialized memory, then a file may be created with trailing characters that represent the uninitialized memory. The ability to create an initramfs entry would imply already having full control of the system, so the buffer overrun shouldn't be considered a security vulnerability.  Append the output of the following bash script to an existing initramfs and observe any created /initramfs_test_fname_overrunAA* path. E.g.   ./reproducer.sh | gzip >> /myinitramfs  It's easiest to observe non-zero uninitialized memory when the output is gzipped, as it'll overflow the heap allocated @out_buf in __gunzip(), rather than the initrd_start+initrd_size block.  ---- reproducer.sh ---- nilchar=\"A\" # change to \"\\0\" to properly zero terminate / pad magic=\"070701\" ino=1 mode=$(( 0100777 )) uid=0 gid=0 nlink=1 mtime=1 filesize=0 devmajor=0 devminor=1 rdevmajor=0 rdevminor=0 csum=0 fname=\"initramfs_test_fname_overrun\" namelen=$(( ${#fname} + 1 )) # plus one to account for terminator  printf \"%s%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%s\" \\  $magic $ino $mode $uid $gid $nlink $mtime $filesize \\  $devmajor $devminor $rdevmajor $rdevminor $namelen $csum $fname  termpadlen=$(( 1 + ((4 - ((110 + $namelen) & 3)) % 4) )) printf \"%.s${nilchar}\" $(seq 1 $termpadlen) ---- reproducer.sh ----  Symlink filename fields handled in do_symlink() won't overrun past the data segment, due to the explicit zero-termination of the symlink target.  Fix filename buffer overrun by aborting the initramfs FSM if any cpio entry doesn't carry a zero-terminator at the expected (name_len - 1) offset.(CVE-2024-53142)\n\nIn the Linux kernel, the following vulnerability has been resolved:  ALSA: usb-audio: Fix out of bounds reads when finding clock sources  The current USB-audio driver code doesn't check bLength of each descriptor at traversing for clock descriptors.  That is, when a device provides a bogus descriptor with a shorter bLength, the driver might hit out-of-bounds reads.  For addressing it, this patch adds sanity checks to the validator functions for the clock descriptor traversal.  When the descriptor length is shorter than expected, it's skipped in the loop.  For the clock source and clock multiplier descriptors, we can just check bLength against the sizeof() of each descriptor type. OTOH, the clock selector descriptor of UAC2 and UAC3 has an array of bNrInPins elements and two more fields at its tail, hence those have to be checked in addition to the sizeof() check.(CVE-2024-53150)",
				"category":"general",
				"title":"Description"
			},
			{
				"text":"An update for kernel is now available for openEuler-22.03-LTS-SP1.\n\nopenEuler Security has rated this update as having a security impact of high. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.",
				"category":"general",
				"title":"Topic"
			},
			{
				"text":"High",
				"category":"general",
				"title":"Severity"
			},
			{
				"text":"kernel",
				"category":"general",
				"title":"Affected Component"
			}
		],
		"publisher":{
			"issuing_authority":"openEuler security committee",
			"name":"openEuler",
			"namespace":"https://www.openeuler.org",
			"contact_details":"openeuler-security@openeuler.org",
			"category":"vendor"
		},
		"references":[
			{
				"summary":"openEuler-SA-2025-1016",
				"category":"self",
				"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1016"
			},
			{
				"summary":"CVE-2022-48868",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2022-48868&packageName=kernel"
			},
			{
				"summary":"CVE-2022-48949",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2022-48949&packageName=kernel"
			},
			{
				"summary":"CVE-2022-48971",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2022-48971&packageName=kernel"
			},
			{
				"summary":"CVE-2022-49014",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2022-49014&packageName=kernel"
			},
			{
				"summary":"CVE-2022-49015",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2022-49015&packageName=kernel"
			},
			{
				"summary":"CVE-2022-49022",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2022-49022&packageName=kernel"
			},
			{
				"summary":"CVE-2022-49028",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2022-49028&packageName=kernel"
			},
			{
				"summary":"CVE-2023-52922",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2023-52922&packageName=kernel"
			},
			{
				"summary":"CVE-2023-6356",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2023-6356&packageName=kernel"
			},
			{
				"summary":"CVE-2023-6535",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2023-6535&packageName=kernel"
			},
			{
				"summary":"CVE-2024-46765",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-46765&packageName=kernel"
			},
			{
				"summary":"CVE-2024-50086",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-50086&packageName=kernel"
			},
			{
				"summary":"CVE-2024-50218",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-50218&packageName=kernel"
			},
			{
				"summary":"CVE-2024-53142",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-53142&packageName=kernel"
			},
			{
				"summary":"CVE-2024-53150",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-53150&packageName=kernel"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-48868"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-48949"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-48971"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49014"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49015"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49022"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49028"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52922"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-6356"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-6535"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-46765"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50086"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50218"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-53142"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-53150"
			},
			{
				"summary":"openEuler-SA-2025-1016 vex file",
				"category":"self",
				"url":"https://repo.openeuler.org/security/data/csaf/advisories/2025/csaf-openeuler-sa-2025-1016.json"
			}
		],
		"title":"An update for kernel is now available for openEuler-22.03-LTS-SP1",
		"tracking":{
			"initial_release_date":"2025-01-03T20:54:29+08:00",
			"revision_history":[
				{
					"date":"2025-01-03T20:54:29+08:00",
					"summary":"Initial",
					"number":"1.0.0"
				}
			],
			"generator":{
				"date":"2025-01-03T20:54:29+08:00",
				"engine":{
					"name":"openEuler CSAF Tool V1.0"
				}
			},
			"current_release_date":"2025-01-03T20:54:29+08:00",
			"id":"openEuler-SA-2025-1016",
			"version":"1.0.0",
			"status":"final"
		}
	},
	"product_tree":{
		"branches":[
			{
				"name":"openEuler",
				"category":"vendor",
				"branches":[
					{
						"name":"openEuler",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP1"
									},
									"product_id":"openEuler-22.03-LTS-SP1",
									"name":"openEuler-22.03-LTS-SP1"
								},
								"name":"openEuler-22.03-LTS-SP1",
								"category":"product_version"
							}
						],
						"category":"product_name"
					},
					{
						"name":"aarch64",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP1"
									},
									"product_id":"kernel-5.10.0-136.107.0.187.oe2203sp1.aarch64.rpm",
									"name":"kernel-5.10.0-136.107.0.187.oe2203sp1.aarch64.rpm"
								},
								"name":"kernel-5.10.0-136.107.0.187.oe2203sp1.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP1"
									},
									"product_id":"kernel-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64.rpm",
									"name":"kernel-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64.rpm"
								},
								"name":"kernel-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP1"
									},
									"product_id":"kernel-debugsource-5.10.0-136.107.0.187.oe2203sp1.aarch64.rpm",
									"name":"kernel-debugsource-5.10.0-136.107.0.187.oe2203sp1.aarch64.rpm"
								},
								"name":"kernel-debugsource-5.10.0-136.107.0.187.oe2203sp1.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP1"
									},
									"product_id":"kernel-devel-5.10.0-136.107.0.187.oe2203sp1.aarch64.rpm",
									"name":"kernel-devel-5.10.0-136.107.0.187.oe2203sp1.aarch64.rpm"
								},
								"name":"kernel-devel-5.10.0-136.107.0.187.oe2203sp1.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP1"
									},
									"product_id":"kernel-headers-5.10.0-136.107.0.187.oe2203sp1.aarch64.rpm",
									"name":"kernel-headers-5.10.0-136.107.0.187.oe2203sp1.aarch64.rpm"
								},
								"name":"kernel-headers-5.10.0-136.107.0.187.oe2203sp1.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP1"
									},
									"product_id":"kernel-source-5.10.0-136.107.0.187.oe2203sp1.aarch64.rpm",
									"name":"kernel-source-5.10.0-136.107.0.187.oe2203sp1.aarch64.rpm"
								},
								"name":"kernel-source-5.10.0-136.107.0.187.oe2203sp1.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP1"
									},
									"product_id":"kernel-tools-5.10.0-136.107.0.187.oe2203sp1.aarch64.rpm",
									"name":"kernel-tools-5.10.0-136.107.0.187.oe2203sp1.aarch64.rpm"
								},
								"name":"kernel-tools-5.10.0-136.107.0.187.oe2203sp1.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP1"
									},
									"product_id":"kernel-tools-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64.rpm",
									"name":"kernel-tools-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64.rpm"
								},
								"name":"kernel-tools-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP1"
									},
									"product_id":"kernel-tools-devel-5.10.0-136.107.0.187.oe2203sp1.aarch64.rpm",
									"name":"kernel-tools-devel-5.10.0-136.107.0.187.oe2203sp1.aarch64.rpm"
								},
								"name":"kernel-tools-devel-5.10.0-136.107.0.187.oe2203sp1.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP1"
									},
									"product_id":"perf-5.10.0-136.107.0.187.oe2203sp1.aarch64.rpm",
									"name":"perf-5.10.0-136.107.0.187.oe2203sp1.aarch64.rpm"
								},
								"name":"perf-5.10.0-136.107.0.187.oe2203sp1.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP1"
									},
									"product_id":"perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64.rpm",
									"name":"perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64.rpm"
								},
								"name":"perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP1"
									},
									"product_id":"python3-perf-5.10.0-136.107.0.187.oe2203sp1.aarch64.rpm",
									"name":"python3-perf-5.10.0-136.107.0.187.oe2203sp1.aarch64.rpm"
								},
								"name":"python3-perf-5.10.0-136.107.0.187.oe2203sp1.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP1"
									},
									"product_id":"python3-perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64.rpm",
									"name":"python3-perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64.rpm"
								},
								"name":"python3-perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64.rpm",
								"category":"product_version"
							}
						],
						"category":"architecture"
					},
					{
						"name":"src",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP1"
									},
									"product_id":"kernel-5.10.0-136.107.0.187.oe2203sp1.src.rpm",
									"name":"kernel-5.10.0-136.107.0.187.oe2203sp1.src.rpm"
								},
								"name":"kernel-5.10.0-136.107.0.187.oe2203sp1.src.rpm",
								"category":"product_version"
							}
						],
						"category":"architecture"
					},
					{
						"name":"x86_64",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP1"
									},
									"product_id":"kernel-5.10.0-136.107.0.187.oe2203sp1.x86_64.rpm",
									"name":"kernel-5.10.0-136.107.0.187.oe2203sp1.x86_64.rpm"
								},
								"name":"kernel-5.10.0-136.107.0.187.oe2203sp1.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP1"
									},
									"product_id":"kernel-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64.rpm",
									"name":"kernel-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64.rpm"
								},
								"name":"kernel-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP1"
									},
									"product_id":"kernel-debugsource-5.10.0-136.107.0.187.oe2203sp1.x86_64.rpm",
									"name":"kernel-debugsource-5.10.0-136.107.0.187.oe2203sp1.x86_64.rpm"
								},
								"name":"kernel-debugsource-5.10.0-136.107.0.187.oe2203sp1.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP1"
									},
									"product_id":"kernel-devel-5.10.0-136.107.0.187.oe2203sp1.x86_64.rpm",
									"name":"kernel-devel-5.10.0-136.107.0.187.oe2203sp1.x86_64.rpm"
								},
								"name":"kernel-devel-5.10.0-136.107.0.187.oe2203sp1.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP1"
									},
									"product_id":"kernel-headers-5.10.0-136.107.0.187.oe2203sp1.x86_64.rpm",
									"name":"kernel-headers-5.10.0-136.107.0.187.oe2203sp1.x86_64.rpm"
								},
								"name":"kernel-headers-5.10.0-136.107.0.187.oe2203sp1.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP1"
									},
									"product_id":"kernel-source-5.10.0-136.107.0.187.oe2203sp1.x86_64.rpm",
									"name":"kernel-source-5.10.0-136.107.0.187.oe2203sp1.x86_64.rpm"
								},
								"name":"kernel-source-5.10.0-136.107.0.187.oe2203sp1.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP1"
									},
									"product_id":"kernel-tools-5.10.0-136.107.0.187.oe2203sp1.x86_64.rpm",
									"name":"kernel-tools-5.10.0-136.107.0.187.oe2203sp1.x86_64.rpm"
								},
								"name":"kernel-tools-5.10.0-136.107.0.187.oe2203sp1.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP1"
									},
									"product_id":"kernel-tools-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64.rpm",
									"name":"kernel-tools-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64.rpm"
								},
								"name":"kernel-tools-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP1"
									},
									"product_id":"kernel-tools-devel-5.10.0-136.107.0.187.oe2203sp1.x86_64.rpm",
									"name":"kernel-tools-devel-5.10.0-136.107.0.187.oe2203sp1.x86_64.rpm"
								},
								"name":"kernel-tools-devel-5.10.0-136.107.0.187.oe2203sp1.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP1"
									},
									"product_id":"perf-5.10.0-136.107.0.187.oe2203sp1.x86_64.rpm",
									"name":"perf-5.10.0-136.107.0.187.oe2203sp1.x86_64.rpm"
								},
								"name":"perf-5.10.0-136.107.0.187.oe2203sp1.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP1"
									},
									"product_id":"perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64.rpm",
									"name":"perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64.rpm"
								},
								"name":"perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP1"
									},
									"product_id":"python3-perf-5.10.0-136.107.0.187.oe2203sp1.x86_64.rpm",
									"name":"python3-perf-5.10.0-136.107.0.187.oe2203sp1.x86_64.rpm"
								},
								"name":"python3-perf-5.10.0-136.107.0.187.oe2203sp1.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP1"
									},
									"product_id":"python3-perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64.rpm",
									"name":"python3-perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64.rpm"
								},
								"name":"python3-perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64.rpm",
								"category":"product_version"
							}
						],
						"category":"architecture"
					}
				]
			}
		],
		"relationships":[
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP1",
				"product_reference":"kernel-5.10.0-136.107.0.187.oe2203sp1.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"name":"kernel-5.10.0-136.107.0.187.oe2203sp1.aarch64 as a component of openEuler-22.03-LTS-SP1"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP1",
				"product_reference":"kernel-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"name":"kernel-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64 as a component of openEuler-22.03-LTS-SP1"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP1",
				"product_reference":"kernel-debugsource-5.10.0-136.107.0.187.oe2203sp1.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"name":"kernel-debugsource-5.10.0-136.107.0.187.oe2203sp1.aarch64 as a component of openEuler-22.03-LTS-SP1"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP1",
				"product_reference":"kernel-devel-5.10.0-136.107.0.187.oe2203sp1.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"name":"kernel-devel-5.10.0-136.107.0.187.oe2203sp1.aarch64 as a component of openEuler-22.03-LTS-SP1"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP1",
				"product_reference":"kernel-headers-5.10.0-136.107.0.187.oe2203sp1.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"name":"kernel-headers-5.10.0-136.107.0.187.oe2203sp1.aarch64 as a component of openEuler-22.03-LTS-SP1"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP1",
				"product_reference":"kernel-source-5.10.0-136.107.0.187.oe2203sp1.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"name":"kernel-source-5.10.0-136.107.0.187.oe2203sp1.aarch64 as a component of openEuler-22.03-LTS-SP1"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP1",
				"product_reference":"kernel-tools-5.10.0-136.107.0.187.oe2203sp1.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"name":"kernel-tools-5.10.0-136.107.0.187.oe2203sp1.aarch64 as a component of openEuler-22.03-LTS-SP1"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP1",
				"product_reference":"kernel-tools-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"name":"kernel-tools-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64 as a component of openEuler-22.03-LTS-SP1"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP1",
				"product_reference":"kernel-tools-devel-5.10.0-136.107.0.187.oe2203sp1.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"name":"kernel-tools-devel-5.10.0-136.107.0.187.oe2203sp1.aarch64 as a component of openEuler-22.03-LTS-SP1"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP1",
				"product_reference":"perf-5.10.0-136.107.0.187.oe2203sp1.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP1:perf-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"name":"perf-5.10.0-136.107.0.187.oe2203sp1.aarch64 as a component of openEuler-22.03-LTS-SP1"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP1",
				"product_reference":"perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"name":"perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64 as a component of openEuler-22.03-LTS-SP1"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP1",
				"product_reference":"python3-perf-5.10.0-136.107.0.187.oe2203sp1.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"name":"python3-perf-5.10.0-136.107.0.187.oe2203sp1.aarch64 as a component of openEuler-22.03-LTS-SP1"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP1",
				"product_reference":"python3-perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"name":"python3-perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64 as a component of openEuler-22.03-LTS-SP1"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP1",
				"product_reference":"kernel-5.10.0-136.107.0.187.oe2203sp1.src.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.107.0.187.oe2203sp1.src",
					"name":"kernel-5.10.0-136.107.0.187.oe2203sp1.src as a component of openEuler-22.03-LTS-SP1"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP1",
				"product_reference":"kernel-5.10.0-136.107.0.187.oe2203sp1.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"name":"kernel-5.10.0-136.107.0.187.oe2203sp1.x86_64 as a component of openEuler-22.03-LTS-SP1"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP1",
				"product_reference":"kernel-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"name":"kernel-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64 as a component of openEuler-22.03-LTS-SP1"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP1",
				"product_reference":"kernel-debugsource-5.10.0-136.107.0.187.oe2203sp1.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"name":"kernel-debugsource-5.10.0-136.107.0.187.oe2203sp1.x86_64 as a component of openEuler-22.03-LTS-SP1"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP1",
				"product_reference":"kernel-devel-5.10.0-136.107.0.187.oe2203sp1.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"name":"kernel-devel-5.10.0-136.107.0.187.oe2203sp1.x86_64 as a component of openEuler-22.03-LTS-SP1"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP1",
				"product_reference":"kernel-headers-5.10.0-136.107.0.187.oe2203sp1.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"name":"kernel-headers-5.10.0-136.107.0.187.oe2203sp1.x86_64 as a component of openEuler-22.03-LTS-SP1"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP1",
				"product_reference":"kernel-source-5.10.0-136.107.0.187.oe2203sp1.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"name":"kernel-source-5.10.0-136.107.0.187.oe2203sp1.x86_64 as a component of openEuler-22.03-LTS-SP1"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP1",
				"product_reference":"kernel-tools-5.10.0-136.107.0.187.oe2203sp1.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"name":"kernel-tools-5.10.0-136.107.0.187.oe2203sp1.x86_64 as a component of openEuler-22.03-LTS-SP1"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP1",
				"product_reference":"kernel-tools-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"name":"kernel-tools-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64 as a component of openEuler-22.03-LTS-SP1"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP1",
				"product_reference":"kernel-tools-devel-5.10.0-136.107.0.187.oe2203sp1.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"name":"kernel-tools-devel-5.10.0-136.107.0.187.oe2203sp1.x86_64 as a component of openEuler-22.03-LTS-SP1"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP1",
				"product_reference":"perf-5.10.0-136.107.0.187.oe2203sp1.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP1:perf-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"name":"perf-5.10.0-136.107.0.187.oe2203sp1.x86_64 as a component of openEuler-22.03-LTS-SP1"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP1",
				"product_reference":"perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"name":"perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64 as a component of openEuler-22.03-LTS-SP1"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP1",
				"product_reference":"python3-perf-5.10.0-136.107.0.187.oe2203sp1.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"name":"python3-perf-5.10.0-136.107.0.187.oe2203sp1.x86_64 as a component of openEuler-22.03-LTS-SP1"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP1",
				"product_reference":"python3-perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"name":"python3-perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64 as a component of openEuler-22.03-LTS-SP1"
				},
				"category":"default_component_of"
			}
		]
	},
	"vulnerabilities":[
		{
			"cve":"CVE-2022-48868",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\ndmaengine: idxd: Let probe fail when workqueue cannot be enabled\n\nThe workqueue is enabled when the appropriate driver is loaded and\ndisabled when the driver is removed. When the driver is removed it\nassumes that the workqueue was enabled successfully and proceeds to\nfree allocations made during workqueue enabling.\n\nFailure during workqueue enabling does not prevent the driver from\nbeing loaded. This is because the error path within drv_enable_wq()\nreturns success unless a second failure is encountered\nduring the error path. By returning success it is possible to load\nthe driver even if the workqueue cannot be enabled and\nallocations that do not exist are attempted to be freed during\ndriver remove.\n\nSome examples of problematic flows:\n(a)\n\n idxd_dmaengine_drv_probe() -> drv_enable_wq() -> idxd_wq_request_irq():\n In above flow, if idxd_wq_request_irq() fails then\n idxd_wq_unmap_portal() is called on error exit path, but\n drv_enable_wq() returns 0 because idxd_wq_disable() succeeds. The\n driver is thus loaded successfully.\n\n idxd_dmaengine_drv_remove()->drv_disable_wq()->idxd_wq_unmap_portal()\n Above flow on driver unload triggers the WARN in devm_iounmap() because\n the device resource has already been removed during error path of\n drv_enable_wq().\n\n(b)\n\n idxd_dmaengine_drv_probe() -> drv_enable_wq() -> idxd_wq_request_irq():\n In above flow, if idxd_wq_request_irq() fails then\n idxd_wq_init_percpu_ref() is never called to initialize the percpu\n counter, yet the driver loads successfully because drv_enable_wq()\n returns 0.\n\n idxd_dmaengine_drv_remove()->__idxd_wq_quiesce()->percpu_ref_kill():\n Above flow on driver unload triggers a BUG when attempting to drop the\n initial ref of the uninitialized percpu ref:\n BUG: kernel NULL pointer dereference, address: 0000000000000010\n\nFix the drv_enable_wq() error path by returning the original error that\nindicates failure of workqueue enabling. This ensures that the probe\nfails when an error is encountered and the driver remove paths are only\nattempted when the workqueue was enabled successfully.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:perf-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.107.0.187.oe2203sp1.src",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:perf-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.107.0.187.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1016"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.107.0.187.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2022-48868"
		},
		{
			"cve":"CVE-2022-48949",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nigb: Initialize mailbox message for VF reset\n\nWhen a MAC address is not assigned to the VF, that portion of the message\nsent to the VF is not set. The memory, however, is allocated from the\nstack meaning that information may be leaked to the VM. Initialize the\nmessage buffer to 0 so that no information is passed to the VM in this\ncase.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:perf-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.107.0.187.oe2203sp1.src",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:perf-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.107.0.187.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1016"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.107.0.187.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2022-48949"
		},
		{
			"cve":"CVE-2022-48971",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: Fix not cleanup led when bt_init fails\n\nbt_init() calls bt_leds_init() to register led, but if it fails later,\nbt_leds_cleanup() is not called to unregister it.\n\nThis can cause panic if the argument \"bluetooth-power\" in text is freed\nand then another led_trigger_register() tries to access it:\n\nBUG: unable to handle page fault for address: ffffffffc06d3bc0\nRIP: 0010:strcmp+0xc/0x30\n  Call Trace:\n    <TASK>\n    led_trigger_register+0x10d/0x4f0\n    led_trigger_register_simple+0x7d/0x100\n    bt_init+0x39/0xf7 [bluetooth]\n    do_one_initcall+0xd0/0x4e0",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:perf-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.107.0.187.oe2203sp1.src",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:perf-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.107.0.187.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1016"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.107.0.187.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2022-48971"
		},
		{
			"cve":"CVE-2022-49014",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nnet: tun: Fix use-after-free in tun_detach()\n\nsyzbot reported use-after-free in tun_detach() [1].  This causes call\ntrace like below:\n\n==================================================================\nBUG: KASAN: use-after-free in notifier_call_chain+0x1ee/0x200 kernel/notifier.c:75\nRead of size 8 at addr ffff88807324e2a8 by task syz-executor.0/3673\n\nCPU: 0 PID: 3673 Comm: syz-executor.0 Not tainted 6.1.0-rc5-syzkaller-00044-gcc675d22e422 #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022\nCall Trace:\n <TASK>\n __dump_stack lib/dump_stack.c:88 [inline]\n dump_stack_lvl+0xd1/0x138 lib/dump_stack.c:106\n print_address_description mm/kasan/report.c:284 [inline]\n print_report+0x15e/0x461 mm/kasan/report.c:395\n kasan_report+0xbf/0x1f0 mm/kasan/report.c:495\n notifier_call_chain+0x1ee/0x200 kernel/notifier.c:75\n call_netdevice_notifiers_info+0x86/0x130 net/core/dev.c:1942\n call_netdevice_notifiers_extack net/core/dev.c:1983 [inline]\n call_netdevice_notifiers net/core/dev.c:1997 [inline]\n netdev_wait_allrefs_any net/core/dev.c:10237 [inline]\n netdev_run_todo+0xbc6/0x1100 net/core/dev.c:10351\n tun_detach drivers/net/tun.c:704 [inline]\n tun_chr_close+0xe4/0x190 drivers/net/tun.c:3467\n __fput+0x27c/0xa90 fs/file_table.c:320\n task_work_run+0x16f/0x270 kernel/task_work.c:179\n exit_task_work include/linux/task_work.h:38 [inline]\n do_exit+0xb3d/0x2a30 kernel/exit.c:820\n do_group_exit+0xd4/0x2a0 kernel/exit.c:950\n get_signal+0x21b1/0x2440 kernel/signal.c:2858\n arch_do_signal_or_restart+0x86/0x2300 arch/x86/kernel/signal.c:869\n exit_to_user_mode_loop kernel/entry/common.c:168 [inline]\n exit_to_user_mode_prepare+0x15f/0x250 kernel/entry/common.c:203\n __syscall_exit_to_user_mode_work kernel/entry/common.c:285 [inline]\n syscall_exit_to_user_mode+0x1d/0x50 kernel/entry/common.c:296\n do_syscall_64+0x46/0xb0 arch/x86/entry/common.c:86\n entry_SYSCALL_64_after_hwframe+0x63/0xcd\n\nThe cause of the issue is that sock_put() from __tun_detach() drops\nlast reference count for struct net, and then notifier_call_chain()\nfrom netdev_state_change() accesses that struct net.\n\nThis patch fixes the issue by calling sock_put() from tun_detach()\nafter all necessary accesses for the struct net has done.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:perf-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.107.0.187.oe2203sp1.src",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:perf-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.107.0.187.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1016"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.8,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.107.0.187.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2022-49014"
		},
		{
			"cve":"CVE-2022-49015",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nnet: hsr: Fix potential use-after-free\n\nThe skb is delivered to netif_rx() which may free it, after calling this,\ndereferencing skb may trigger use-after-free.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:perf-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.107.0.187.oe2203sp1.src",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:perf-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.107.0.187.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1016"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.8,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.107.0.187.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2022-49015"
		},
		{
			"cve":"CVE-2022-49022",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: mac8021: fix possible oob access in ieee80211_get_rate_duration\n\nFix possible out-of-bound access in ieee80211_get_rate_duration routine\nas reported by the following UBSAN report:\n\nUBSAN: array-index-out-of-bounds in net/mac80211/airtime.c:455:47\nindex 15 is out of range for type 'u16 [12]'\nCPU: 2 PID: 217 Comm: kworker/u32:10 Not tainted 6.1.0-060100rc3-generic\nHardware name: Acer Aspire TC-281/Aspire TC-281, BIOS R01-A2 07/18/2017\nWorkqueue: mt76 mt76u_tx_status_data [mt76_usb]\nCall Trace:\n <TASK>\n show_stack+0x4e/0x61\n dump_stack_lvl+0x4a/0x6f\n dump_stack+0x10/0x18\n ubsan_epilogue+0x9/0x43\n __ubsan_handle_out_of_bounds.cold+0x42/0x47\nieee80211_get_rate_duration.constprop.0+0x22f/0x2a0 [mac80211]\n ? ieee80211_tx_status_ext+0x32e/0x640 [mac80211]\n ieee80211_calc_rx_airtime+0xda/0x120 [mac80211]\n ieee80211_calc_tx_airtime+0xb4/0x100 [mac80211]\n mt76x02_send_tx_status+0x266/0x480 [mt76x02_lib]\n mt76x02_tx_status_data+0x52/0x80 [mt76x02_lib]\n mt76u_tx_status_data+0x67/0xd0 [mt76_usb]\n process_one_work+0x225/0x400\n worker_thread+0x50/0x3e0\n ? process_one_work+0x400/0x400\n kthread+0xe9/0x110\n ? kthread_complete_and_exit+0x20/0x20\n ret_from_fork+0x22/0x30",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:perf-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.107.0.187.oe2203sp1.src",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:perf-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.107.0.187.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1016"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.8,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.107.0.187.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2022-49022"
		},
		{
			"cve":"CVE-2022-49028",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nixgbevf: Fix resource leak in ixgbevf_init_module()\n\nixgbevf_init_module() won't destroy the workqueue created by\ncreate_singlethread_workqueue() when pci_register_driver() failed. Add\ndestroy_workqueue() in fail path to prevent the resource leak.\n\nSimilar to the handling of u132_hcd_init in commit f276e002793c\n(\"usb: u132-hcd: fix resource leak\")",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:perf-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.107.0.187.oe2203sp1.src",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:perf-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.107.0.187.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1016"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.107.0.187.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2022-49028"
		},
		{
			"cve":"CVE-2023-52922",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\ncan: bcm: Fix UAF in bcm_proc_show()\n\nBUG: KASAN: slab-use-after-free in bcm_proc_show+0x969/0xa80\nRead of size 8 at addr ffff888155846230 by task cat/7862\n\nCPU: 1 PID: 7862 Comm: cat Not tainted 6.5.0-rc1-00153-gc8746099c197 #230\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 04/01/2014\nCall Trace:\n <TASK>\n dump_stack_lvl+0xd5/0x150\n print_report+0xc1/0x5e0\n kasan_report+0xba/0xf0\n bcm_proc_show+0x969/0xa80\n seq_read_iter+0x4f6/0x1260\n seq_read+0x165/0x210\n proc_reg_read+0x227/0x300\n vfs_read+0x1d5/0x8d0\n ksys_read+0x11e/0x240\n do_syscall_64+0x35/0xb0\n entry_SYSCALL_64_after_hwframe+0x63/0xcd\n\nAllocated by task 7846:\n kasan_save_stack+0x1e/0x40\n kasan_set_track+0x21/0x30\n __kasan_kmalloc+0x9e/0xa0\n bcm_sendmsg+0x264b/0x44e0\n sock_sendmsg+0xda/0x180\n ____sys_sendmsg+0x735/0x920\n ___sys_sendmsg+0x11d/0x1b0\n __sys_sendmsg+0xfa/0x1d0\n do_syscall_64+0x35/0xb0\n entry_SYSCALL_64_after_hwframe+0x63/0xcd\n\nFreed by task 7846:\n kasan_save_stack+0x1e/0x40\n kasan_set_track+0x21/0x30\n kasan_save_free_info+0x27/0x40\n ____kasan_slab_free+0x161/0x1c0\n slab_free_freelist_hook+0x119/0x220\n __kmem_cache_free+0xb4/0x2e0\n rcu_core+0x809/0x1bd0\n\nbcm_op is freed before procfs entry be removed in bcm_release(),\nthis lead to bcm_proc_show() may read the freed bcm_op.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:perf-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.107.0.187.oe2203sp1.src",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:perf-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.107.0.187.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1016"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.8,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.107.0.187.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2023-52922"
		},
		{
			"cve":"CVE-2023-6356",
			"notes":[
				{
					"text":"A flaw was found in the Linux kernel's NVMe driver. This issue may allow an unauthenticated malicious actor to send a set of crafted TCP packages when using NVMe over TCP, leading the NVMe driver to a NULL pointer dereference in the NVMe driver and causing kernel panic and a denial of service.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:perf-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.107.0.187.oe2203sp1.src",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:perf-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.107.0.187.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1016"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.5,
						"vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.107.0.187.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2023-6356"
		},
		{
			"cve":"CVE-2023-6535",
			"notes":[
				{
					"text":"A flaw was found in the Linux kernel's NVMe driver. This issue may allow an unauthenticated malicious actor to send a set of crafted TCP packages when using NVMe over TCP, leading the NVMe driver to a NULL pointer dereference in the NVMe driver, causing kernel panic and a denial of service.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:perf-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.107.0.187.oe2203sp1.src",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:perf-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.107.0.187.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1016"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.5,
						"vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.107.0.187.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2023-6535"
		},
		{
			"cve":"CVE-2024-46765",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nice: protect XDP configuration with a mutex\n\nThe main threat to data consistency in ice_xdp() is a possible asynchronous\nPF reset. It can be triggered by a user or by TX timeout handler.\n\nXDP setup and PF reset code access the same resources in the following\nsections:\n* ice_vsi_close() in ice_prepare_for_reset() - already rtnl-locked\n* ice_vsi_rebuild() for the PF VSI - not protected\n* ice_vsi_open() - already rtnl-locked\n\nWith an unfortunate timing, such accesses can result in a crash such as the\none below:\n\n[ +1.999878] ice 0000:b1:00.0: Registered XDP mem model MEM_TYPE_XSK_BUFF_POOL on Rx ring 14\n[ +2.002992] ice 0000:b1:00.0: Registered XDP mem model MEM_TYPE_XSK_BUFF_POOL on Rx ring 18\n[Mar15 18:17] ice 0000:b1:00.0 ens801f0np0: NETDEV WATCHDOG: CPU: 38: transmit queue 14 timed out 80692736 ms\n[ +0.000093] ice 0000:b1:00.0 ens801f0np0: tx_timeout: VSI_num: 6, Q 14, NTC: 0x0, HW_HEAD: 0x0, NTU: 0x0, INT: 0x4000001\n[ +0.000012] ice 0000:b1:00.0 ens801f0np0: tx_timeout recovery level 1, txqueue 14\n[ +0.394718] ice 0000:b1:00.0: PTP reset successful\n[ +0.006184] BUG: kernel NULL pointer dereference, address: 0000000000000098\n[ +0.000045] #PF: supervisor read access in kernel mode\n[ +0.000023] #PF: error_code(0x0000) - not-present page\n[ +0.000023] PGD 0 P4D 0\n[ +0.000018] Oops: 0000 [#1] PREEMPT SMP NOPTI\n[ +0.000023] CPU: 38 PID: 7540 Comm: kworker/38:1 Not tainted 6.8.0-rc7 #1\n[ +0.000031] Hardware name: Intel Corporation S2600WFT/S2600WFT, BIOS SE5C620.86B.02.01.0014.082620210524 08/26/2021\n[ +0.000036] Workqueue: ice ice_service_task [ice]\n[ +0.000183] RIP: 0010:ice_clean_tx_ring+0xa/0xd0 [ice]\n[...]\n[ +0.000013] Call Trace:\n[ +0.000016] <TASK>\n[ +0.000014] ? __die+0x1f/0x70\n[ +0.000029] ? page_fault_oops+0x171/0x4f0\n[ +0.000029] ? schedule+0x3b/0xd0\n[ +0.000027] ? exc_page_fault+0x7b/0x180\n[ +0.000022] ? asm_exc_page_fault+0x22/0x30\n[ +0.000031] ? ice_clean_tx_ring+0xa/0xd0 [ice]\n[ +0.000194] ice_free_tx_ring+0xe/0x60 [ice]\n[ +0.000186] ice_destroy_xdp_rings+0x157/0x310 [ice]\n[ +0.000151] ice_vsi_decfg+0x53/0xe0 [ice]\n[ +0.000180] ice_vsi_rebuild+0x239/0x540 [ice]\n[ +0.000186] ice_vsi_rebuild_by_type+0x76/0x180 [ice]\n[ +0.000145] ice_rebuild+0x18c/0x840 [ice]\n[ +0.000145] ? delay_tsc+0x4a/0xc0\n[ +0.000022] ? delay_tsc+0x92/0xc0\n[ +0.000020] ice_do_reset+0x140/0x180 [ice]\n[ +0.000886] ice_service_task+0x404/0x1030 [ice]\n[ +0.000824] process_one_work+0x171/0x340\n[ +0.000685] worker_thread+0x277/0x3a0\n[ +0.000675] ? preempt_count_add+0x6a/0xa0\n[ +0.000677] ? _raw_spin_lock_irqsave+0x23/0x50\n[ +0.000679] ? __pfx_worker_thread+0x10/0x10\n[ +0.000653] kthread+0xf0/0x120\n[ +0.000635] ? __pfx_kthread+0x10/0x10\n[ +0.000616] ret_from_fork+0x2d/0x50\n[ +0.000612] ? __pfx_kthread+0x10/0x10\n[ +0.000604] ret_from_fork_asm+0x1b/0x30\n[ +0.000604] </TASK>\n\nThe previous way of handling this through returning -EBUSY is not viable,\nparticularly when destroying AF_XDP socket, because the kernel proceeds\nwith removal anyway.\n\nThere is plenty of code between those calls and there is no need to create\na large critical section that covers all of them, same as there is no need\nto protect ice_vsi_rebuild() with rtnl_lock().\n\nAdd xdp_state_lock mutex to protect ice_vsi_rebuild() and ice_xdp().\n\nLeaving unprotected sections in between would result in two states that\nhave to be considered:\n1. when the VSI is closed, but not yet rebuild\n2. when VSI is already rebuild, but not yet open\n\nThe latter case is actually already handled through !netif_running() case,\nwe just need to adjust flag checking a little. The former one is not as\ntrivial, because between ice_vsi_close() and ice_vsi_rebuild(), a lot of\nhardware interaction happens, this can make adding/deleting rings exit\nwith an error. Luckily, VSI rebuild is pending and can apply new\nconfiguration for us in a managed fashion.\n\nTherefore, add an additional VSI state flag ICE_VSI_REBUILD_PENDING to\nindicate that ice_x\n---truncated---",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:perf-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.107.0.187.oe2203sp1.src",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:perf-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.107.0.187.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1016"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.107.0.187.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-46765"
		},
		{
			"cve":"CVE-2024-50086",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nksmbd: fix user-after-free from session log off\n\nThere is racy issue between smb2 session log off and smb2 session setup.\nIt will cause user-after-free from session log off.\nThis add session_lock when setting SMB2_SESSION_EXPIRED and referece\ncount to session struct not to free session while it is being used.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:perf-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.107.0.187.oe2203sp1.src",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:perf-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.107.0.187.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1016"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.0,
						"vectorString":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.107.0.187.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2024-50086"
		},
		{
			"cve":"CVE-2024-50218",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nocfs2: pass u64 to ocfs2_truncate_inline maybe overflow\n\nSyzbot reported a kernel BUG in ocfs2_truncate_inline.  There are two\nreasons for this: first, the parameter value passed is greater than\nocfs2_max_inline_data_with_xattr, second, the start and end parameters of\nocfs2_truncate_inline are \"unsigned int\".\n\nSo, we need to add a sanity check for byte_start and byte_len right before\nocfs2_truncate_inline() in ocfs2_remove_inode_range(), if they are greater\nthan ocfs2_max_inline_data_with_xattr return -EINVAL.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:perf-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.107.0.187.oe2203sp1.src",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:perf-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.107.0.187.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1016"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"LOW",
						"baseScore":3.9,
						"vectorString":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.107.0.187.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Low",
					"category":"impact"
				}
			],
			"title":"CVE-2024-50218"
		},
		{
			"cve":"CVE-2024-53142",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\ninitramfs: avoid filename buffer overrun\n\nThe initramfs filename field is defined in\nDocumentation/driver-api/early-userspace/buffer-format.rst as:\n\n 37 cpio_file := ALGN(4) + cpio_header + filename + \"\\0\" + ALGN(4) + data\n...\n 55 ============= ================== =========================\n 56 Field name    Field size         Meaning\n 57 ============= ================== =========================\n...\n 70 c_namesize    8 bytes            Length of filename, including final \\0\n\nWhen extracting an initramfs cpio archive, the kernel's do_name() path\nhandler assumes a zero-terminated path at @collected, passing it\ndirectly to filp_open() / init_mkdir() / init_mknod().\n\nIf a specially crafted cpio entry carries a non-zero-terminated filename\nand is followed by uninitialized memory, then a file may be created with\ntrailing characters that represent the uninitialized memory. The ability\nto create an initramfs entry would imply already having full control of\nthe system, so the buffer overrun shouldn't be considered a security\nvulnerability.\n\nAppend the output of the following bash script to an existing initramfs\nand observe any created /initramfs_test_fname_overrunAA* path. E.g.\n  ./reproducer.sh | gzip >> /myinitramfs\n\nIt's easiest to observe non-zero uninitialized memory when the output is\ngzipped, as it'll overflow the heap allocated @out_buf in __gunzip(),\nrather than the initrd_start+initrd_size block.\n\n---- reproducer.sh ----\nnilchar=\"A\"\t# change to \"\\0\" to properly zero terminate / pad\nmagic=\"070701\"\nino=1\nmode=$(( 0100777 ))\nuid=0\ngid=0\nnlink=1\nmtime=1\nfilesize=0\ndevmajor=0\ndevminor=1\nrdevmajor=0\nrdevminor=0\ncsum=0\nfname=\"initramfs_test_fname_overrun\"\nnamelen=$(( ${#fname} + 1 ))\t# plus one to account for terminator\n\nprintf \"%s%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%s\" \\\n\t$magic $ino $mode $uid $gid $nlink $mtime $filesize \\\n\t$devmajor $devminor $rdevmajor $rdevminor $namelen $csum $fname\n\ntermpadlen=$(( 1 + ((4 - ((110 + $namelen) & 3)) % 4) ))\nprintf \"%.s${nilchar}\" $(seq 1 $termpadlen)\n---- reproducer.sh ----\n\nSymlink filename fields handled in do_symlink() won't overrun past the\ndata segment, due to the explicit zero-termination of the symlink\ntarget.\n\nFix filename buffer overrun by aborting the initramfs FSM if any cpio\nentry doesn't carry a zero-terminator at the expected (name_len - 1)\noffset.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:perf-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.107.0.187.oe2203sp1.src",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:perf-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.107.0.187.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1016"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.8,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.107.0.187.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2024-53142"
		},
		{
			"cve":"CVE-2024-53150",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: usb-audio: Fix out of bounds reads when finding clock sources\n\nThe current USB-audio driver code doesn't check bLength of each\ndescriptor at traversing for clock descriptors.  That is, when a\ndevice provides a bogus descriptor with a shorter bLength, the driver\nmight hit out-of-bounds reads.\n\nFor addressing it, this patch adds sanity checks to the validator\nfunctions for the clock descriptor traversal.  When the descriptor\nlength is shorter than expected, it's skipped in the loop.\n\nFor the clock source and clock multiplier descriptors, we can just\ncheck bLength against the sizeof() of each descriptor type.\nOTOH, the clock selector descriptor of UAC2 and UAC3 has an array\nof bNrInPins elements and two more fields at its tail, hence those\nhave to be checked in addition to the sizeof() check.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:perf-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.107.0.187.oe2203sp1.src",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:perf-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.107.0.187.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.107.0.187.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1016"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.107.0.187.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.107.0.187.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.107.0.187.oe2203sp1.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-53150"
		}
	]
}