{
	"document":{
		"aggregate_severity":{
			"namespace":"https://nvd.nist.gov/vuln-metrics/cvss",
			"text":"High"
		},
		"category":"csaf_vex",
		"csaf_version":"2.0",
		"distribution":{
			"tlp":{
				"label":"WHITE",
				"url":"https:/www.first.org/tlp/"
			}
		},
		"lang":"en",
		"notes":[
			{
				"text":"kernel security update",
				"category":"general",
				"title":"Synopsis"
			},
			{
				"text":"An update for kernel is now available for openEuler-24.03-LTS",
				"category":"general",
				"title":"Summary"
			},
			{
				"text":"The Linux Kernel, the operating system core itself.\n\nSecurity Fix(es):\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nnet: can: j1939: enhanced error handling for tightly received RTS messages in xtp_rx_rts_session_new\n\nThis patch enhances error handling in scenarios with RTS (Request to\nSend) messages arriving closely. It replaces the less informative WARN_ON_ONCE\nbacktraces with a new error handling method. This provides clearer error\nmessages and allows for the early termination of problematic sessions.\nPreviously, sessions were only released at the end of j1939_xtp_rx_rts().\n\nPotentially this could be reproduced with something like:\ntestj1939 -r vcan0:0x80 &\nwhile true; do\n\t# send first RTS\n\tcansend vcan0 18EC8090#1014000303002301;\n\t# send second RTS\n\tcansend vcan0 18EC8090#1014000303002301;\n\t# send abort\n\tcansend vcan0 18EC8090#ff00000000002301;\ndone(CVE-2023-52887)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: L2CAP: Fix slab-use-after-free in l2cap_connect()\n\nExtend a critical section to prevent chan from early freeing.\nAlso make the l2cap_connect() return type void. Nothing is using the\nreturned value but it is ugly to return a potentially freed pointer.\nMaking it void will help with backports because earlier kernels did use\nthe return value. Now the compile will break for kernels where this\npatch is not a complete fix.\n\nCall stack summary:\n\n[use]\nl2cap_bredr_sig_cmd\n  l2cap_connect\n  ┌ mutex_lock(&conn->chan_lock);\n  │ chan = pchan->ops->new_connection(pchan); <- alloc chan\n  │ __l2cap_chan_add(conn, chan);\n  │   l2cap_chan_hold(chan);\n  │   list_add(&chan->list, &conn->chan_l);   ... (1)\n  └ mutex_unlock(&conn->chan_lock);\n    chan->conf_state              ... (4) <- use after free\n\n[free]\nl2cap_conn_del\n┌ mutex_lock(&conn->chan_lock);\n│ foreach chan in conn->chan_l:            ... (2)\n│   l2cap_chan_put(chan);\n│     l2cap_chan_destroy\n│       kfree(chan)               ... (3) <- chan freed\n└ mutex_unlock(&conn->chan_lock);\n\n==================================================================\nBUG: KASAN: slab-use-after-free in instrument_atomic_read\ninclude/linux/instrumented.h:68 [inline]\nBUG: KASAN: slab-use-after-free in _test_bit\ninclude/asm-generic/bitops/instrumented-non-atomic.h:141 [inline]\nBUG: KASAN: slab-use-after-free in l2cap_connect+0xa67/0x11a0\nnet/bluetooth/l2cap_core.c:4260\nRead of size 8 at addr ffff88810bf040a0 by task kworker/u3:1/311(CVE-2024-36013)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nnet: hns3: fix kernel crash when devlink reload during pf initialization\n\nThe devlink reload process will access the hardware resources,\nbut the register operation is done before the hardware is initialized.\nSo, processing the devlink reload during initialization may lead to kernel\ncrash. This patch fixes this by taking devl_lock during initialization.(CVE-2024-36021)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nbnxt_re: avoid shift undefined behavior in bnxt_qplib_alloc_init_hwq\n\nUndefined behavior is triggered when bnxt_qplib_alloc_init_hwq is called\nwith hwq_attr->aux_depth != 0 and hwq_attr->aux_stride == 0.\nIn that case, \"roundup_pow_of_two(hwq_attr->aux_stride)\" gets called.\nroundup_pow_of_two is documented as undefined for 0.\n\nFix it in the one caller that had this combination.\n\nThe undefined behavior was detected by UBSAN:\n  UBSAN: shift-out-of-bounds in ./include/linux/log2.h:57:13\n  shift exponent 64 is too large for 64-bit type 'long unsigned int'\n  CPU: 24 PID: 1075 Comm: (udev-worker) Not tainted 6.9.0-rc6+ #4\n  Hardware name: Abacus electric, s.r.o. - servis@abacus.cz Super Server/H12SSW-iN, BIOS 2.7 10/25/2023\n  Call Trace:\n   <TASK>\n   dump_stack_lvl+0x5d/0x80\n   ubsan_epilogue+0x5/0x30\n   __ubsan_handle_shift_out_of_bounds.cold+0x61/0xec\n   __roundup_pow_of_two+0x25/0x35 [bnxt_re]\n   bnxt_qplib_alloc_init_hwq+0xa1/0x470 [bnxt_re]\n   bnxt_qplib_create_qp+0x19e/0x840 [bnxt_re]\n   bnxt_re_create_qp+0x9b1/0xcd0 [bnxt_re]\n   ? srso_alias_return_thunk+0x5/0xfbef5\n   ? srso_alias_return_thunk+0x5/0xfbef5\n   ? __kmalloc+0x1b6/0x4f0\n   ? create_qp.part.0+0x128/0x1c0 [ib_core]\n   ? __pfx_bnxt_re_create_qp+0x10/0x10 [bnxt_re]\n   create_qp.part.0+0x128/0x1c0 [ib_core]\n   ib_create_qp_kernel+0x50/0xd0 [ib_core]\n   create_mad_qp+0x8e/0xe0 [ib_core]\n   ? __pfx_qp_event_handler+0x10/0x10 [ib_core]\n   ib_mad_init_device+0x2be/0x680 [ib_core]\n   add_client_context+0x10d/0x1a0 [ib_core]\n   enable_device_and_get+0xe0/0x1d0 [ib_core]\n   ib_register_device+0x53c/0x630 [ib_core]\n   ? srso_alias_return_thunk+0x5/0xfbef5\n   bnxt_re_probe+0xbd8/0xe50 [bnxt_re]\n   ? __pfx_bnxt_re_probe+0x10/0x10 [bnxt_re]\n   auxiliary_bus_probe+0x49/0x80\n   ? driver_sysfs_add+0x57/0xc0\n   really_probe+0xde/0x340\n   ? pm_runtime_barrier+0x54/0x90\n   ? __pfx___driver_attach+0x10/0x10\n   __driver_probe_device+0x78/0x110\n   driver_probe_device+0x1f/0xa0\n   __driver_attach+0xba/0x1c0\n   bus_for_each_dev+0x8f/0xe0\n   bus_add_driver+0x146/0x220\n   driver_register+0x72/0xd0\n   __auxiliary_driver_register+0x6e/0xd0\n   ? __pfx_bnxt_re_mod_init+0x10/0x10 [bnxt_re]\n   bnxt_re_mod_init+0x3e/0xff0 [bnxt_re]\n   ? __pfx_bnxt_re_mod_init+0x10/0x10 [bnxt_re]\n   do_one_initcall+0x5b/0x310\n   do_init_module+0x90/0x250\n   init_module_from_file+0x86/0xc0\n   idempotent_init_module+0x121/0x2b0\n   __x64_sys_finit_module+0x5e/0xb0\n   do_syscall_64+0x82/0x160\n   ? srso_alias_return_thunk+0x5/0xfbef5\n   ? syscall_exit_to_user_mode_prepare+0x149/0x170\n   ? srso_alias_return_thunk+0x5/0xfbef5\n   ? syscall_exit_to_user_mode+0x75/0x230\n   ? srso_alias_return_thunk+0x5/0xfbef5\n   ? do_syscall_64+0x8e/0x160\n   ? srso_alias_return_thunk+0x5/0xfbef5\n   ? __count_memcg_events+0x69/0x100\n   ? srso_alias_return_thunk+0x5/0xfbef5\n   ? count_memcg_events.constprop.0+0x1a/0x30\n   ? srso_alias_return_thunk+0x5/0xfbef5\n   ? handle_mm_fault+0x1f0/0x300\n   ? srso_alias_return_thunk+0x5/0xfbef5\n   ? do_user_addr_fault+0x34e/0x640\n   ? srso_alias_return_thunk+0x5/0xfbef5\n   ? srso_alias_return_thunk+0x5/0xfbef5\n   entry_SYSCALL_64_after_hwframe+0x76/0x7e\n  RIP: 0033:0x7f4e5132821d\n  Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d e3 db 0c 00 f7 d8 64 89 01 48\n  RSP: 002b:00007ffca9c906a8 EFLAGS: 00000246 ORIG_RAX: 0000000000000139\n  RAX: ffffffffffffffda RBX: 0000563ec8a8f130 RCX: 00007f4e5132821d\n  RDX: 0000000000000000 RSI: 00007f4e518fa07d RDI: 000000000000003b\n  RBP: 00007ffca9c90760 R08: 00007f4e513f6b20 R09: 00007ffca9c906f0\n  R10: 0000563ec8a8faa0 R11: 0000000000000246 R12: 00007f4e518fa07d\n  R13: 0000000000020000 R14: 0000563ec8409e90 R15: 0000563ec8a8fa60\n   </TASK>\n  ---[ end trace ]---(CVE-2024-38540)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nmedia: atomisp: ssh_css: Fix a null-pointer dereference in load_video_binaries\n\nThe allocation failure of mycs->yuv_scaler_binary in load_video_binaries()\nis followed with a dereference of mycs->yuv_scaler_binary after the\nfollowing call chain:\n\nsh_css_pipe_load_binaries()\n  |-> load_video_binaries(mycs->yuv_scaler_binary == NULL)\n  |\n  |-> sh_css_pipe_unload_binaries()\n        |-> unload_video_binaries()\n\nIn unload_video_binaries(), it calls to ia_css_binary_unload with argument\n&pipe->pipe_settings.video.yuv_scaler_binary[i], which refers to the\nsame memory slot as mycs->yuv_scaler_binary. Thus, a null-pointer\ndereference is triggered.(CVE-2024-38547)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\num: Add winch to winch_handlers before registering winch IRQ\n\nRegistering a winch IRQ is racy, an interrupt may occur before the winch is\nadded to the winch_handlers list.\n\nIf that happens, register_winch_irq() adds to that list a winch that is\nscheduled to be (or has already been) freed, causing a panic later in\nwinch_cleanup().\n\nAvoid the race by adding the winch to the winch_handlers list before\nregistering the IRQ, and rolling back if um_request_irq() fails.(CVE-2024-39292)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\ndrm/shmem-helper: Fix BUG_ON() on mmap(PROT_WRITE, MAP_PRIVATE)\n\nLack of check for copy-on-write (COW) mapping in drm_gem_shmem_mmap\nallows users to call mmap with PROT_WRITE and MAP_PRIVATE flag\ncausing a kernel panic due to BUG_ON in vmf_insert_pfn_prot:\nBUG_ON((vma->vm_flags & VM_PFNMAP) && is_cow_mapping(vma->vm_flags));\n\nReturn -EINVAL early if COW mapping is detected.\n\nThis bug affects all drm drivers using default shmem helpers.\nIt can be reproduced by this simple example:\nvoid *ptr = mmap(0, size, PROT_WRITE, MAP_PRIVATE, fd, mmap_offset);\nptr[0] = 0;(CVE-2024-39497)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nwifi: mac80211: mesh: Fix leak of mesh_preq_queue objects\n\nThe hwmp code use objects of type mesh_preq_queue, added to a list in\nieee80211_if_mesh, to keep track of mpath we need to resolve. If the mpath\ngets deleted, ex mesh interface is removed, the entries in that list will\nnever get cleaned. Fix this by flushing all corresponding items of the\npreq_queue in mesh_path_flush_pending().\n\nThis should take care of KASAN reports like this:\n\nunreferenced object 0xffff00000668d800 (size 128):\n  comm \"kworker/u8:4\", pid 67, jiffies 4295419552 (age 1836.444s)\n  hex dump (first 32 bytes):\n    00 1f 05 09 00 00 ff ff 00 d5 68 06 00 00 ff ff  ..........h.....\n    8e 97 ea eb 3e b8 01 00 00 00 00 00 00 00 00 00  ....>...........\n  backtrace:\n    [<000000007302a0b6>] __kmem_cache_alloc_node+0x1e0/0x35c\n    [<00000000049bd418>] kmalloc_trace+0x34/0x80\n    [<0000000000d792bb>] mesh_queue_preq+0x44/0x2a8\n    [<00000000c99c3696>] mesh_nexthop_resolve+0x198/0x19c\n    [<00000000926bf598>] ieee80211_xmit+0x1d0/0x1f4\n    [<00000000fc8c2284>] __ieee80211_subif_start_xmit+0x30c/0x764\n    [<000000005926ee38>] ieee80211_subif_start_xmit+0x9c/0x7a4\n    [<000000004c86e916>] dev_hard_start_xmit+0x174/0x440\n    [<0000000023495647>] __dev_queue_xmit+0xe24/0x111c\n    [<00000000cfe9ca78>] batadv_send_skb_packet+0x180/0x1e4\n    [<000000007bacc5d5>] batadv_v_elp_periodic_work+0x2f4/0x508\n    [<00000000adc3cd94>] process_one_work+0x4b8/0xa1c\n    [<00000000b36425d1>] worker_thread+0x9c/0x634\n    [<0000000005852dd5>] kthread+0x1bc/0x1c4\n    [<000000005fccd770>] ret_from_fork+0x10/0x20\nunreferenced object 0xffff000009051f00 (size 128):\n  comm \"kworker/u8:4\", pid 67, jiffies 4295419553 (age 1836.440s)\n  hex dump (first 32 bytes):\n    90 d6 92 0d 00 00 ff ff 00 d8 68 06 00 00 ff ff  ..........h.....\n    36 27 92 e4 02 e0 01 00 00 58 79 06 00 00 ff ff  6'.......Xy.....\n  backtrace:\n    [<000000007302a0b6>] __kmem_cache_alloc_node+0x1e0/0x35c\n    [<00000000049bd418>] kmalloc_trace+0x34/0x80\n    [<0000000000d792bb>] mesh_queue_preq+0x44/0x2a8\n    [<00000000c99c3696>] mesh_nexthop_resolve+0x198/0x19c\n    [<00000000926bf598>] ieee80211_xmit+0x1d0/0x1f4\n    [<00000000fc8c2284>] __ieee80211_subif_start_xmit+0x30c/0x764\n    [<000000005926ee38>] ieee80211_subif_start_xmit+0x9c/0x7a4\n    [<000000004c86e916>] dev_hard_start_xmit+0x174/0x440\n    [<0000000023495647>] __dev_queue_xmit+0xe24/0x111c\n    [<00000000cfe9ca78>] batadv_send_skb_packet+0x180/0x1e4\n    [<000000007bacc5d5>] batadv_v_elp_periodic_work+0x2f4/0x508\n    [<00000000adc3cd94>] process_one_work+0x4b8/0xa1c\n    [<00000000b36425d1>] worker_thread+0x9c/0x634\n    [<0000000005852dd5>] kthread+0x1bc/0x1c4\n    [<000000005fccd770>] ret_from_fork+0x10/0x20(CVE-2024-40942)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\njfs: don't walk off the end of ealist\n\nAdd a check before visiting the members of ea to\nmake sure each ea stays within the ealist.(CVE-2024-41017)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amdgpu: Fix signedness bug in sdma_v4_0_process_trap_irq()\n\nThe \"instance\" variable needs to be signed for the error handling to work.(CVE-2024-41022)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nFix userfaultfd_api to return EINVAL as expected\n\nCurrently if we request a feature that is not set in the Kernel config we\nfail silently and return all the available features.  However, the man\npage indicates we should return an EINVAL.\n\nWe need to fix this issue since we can end up with a Kernel warning should\na program request the feature UFFD_FEATURE_WP_UNPOPULATED on a kernel with\nthe config not set with this feature.\n\n [  200.812896] WARNING: CPU: 91 PID: 13634 at mm/memory.c:1660 zap_pte_range+0x43d/0x660\n [  200.820738] Modules linked in:\n [  200.869387] CPU: 91 PID: 13634 Comm: userfaultfd Kdump: loaded Not tainted 6.9.0-rc5+ #8\n [  200.877477] Hardware name: Dell Inc. PowerEdge R6525/0N7YGH, BIOS 2.7.3 03/30/2022\n [  200.885052] RIP: 0010:zap_pte_range+0x43d/0x660(CVE-2024-41027)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nnilfs2: fix kernel bug on rename operation of broken directory\n\nSyzbot reported that in rename directory operation on broken directory on\nnilfs2, __block_write_begin_int() called to prepare block write may fail\nBUG_ON check for access exceeding the folio/page size.\n\nThis is because nilfs_dotdot(), which gets parent directory reference\nentry (\"..\") of the directory to be moved or renamed, does not check\nconsistency enough, and may return location exceeding folio/page size for\nbroken directories.\n\nFix this issue by checking required directory entries (\".\" and \"..\") in\nthe first chunk of the directory in nilfs_dotdot().(CVE-2024-41034)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nmm: prevent derefencing NULL ptr in pfn_section_valid()\n\nCommit 5ec8e8ea8b77 (\"mm/sparsemem: fix race in accessing\nmemory_section->usage\") changed pfn_section_valid() to add a READ_ONCE()\ncall around \"ms->usage\" to fix a race with section_deactivate() where\nms->usage can be cleared.  The READ_ONCE() call, by itself, is not enough\nto prevent NULL pointer dereference.  We need to check its value before\ndereferencing it.(CVE-2024-41055)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\npowerpc/pseries: Whitelist dtl slub object for copying to userspace\n\nReading the dispatch trace log from /sys/kernel/debug/powerpc/dtl/cpu-*\nresults in a BUG() when the config CONFIG_HARDENED_USERCOPY is enabled as\nshown below.\n\n    kernel BUG at mm/usercopy.c:102!\n    Oops: Exception in kernel mode, sig: 5 [#1]\n    LE PAGE_SIZE=64K MMU=Radix SMP NR_CPUS=2048 NUMA pSeries\n    Modules linked in: xfs libcrc32c dm_service_time sd_mod t10_pi sg ibmvfc\n    scsi_transport_fc ibmveth pseries_wdt dm_multipath dm_mirror dm_region_hash dm_log dm_mod fuse\n    CPU: 27 PID: 1815 Comm: python3 Not tainted 6.10.0-rc3 #85\n    Hardware name: IBM,9040-MRX POWER10 (raw) 0x800200 0xf000006 of:IBM,FW1060.00 (NM1060_042) hv:phyp pSeries\n    NIP:  c0000000005d23d4 LR: c0000000005d23d0 CTR: 00000000006ee6f8\n    REGS: c000000120c078c0 TRAP: 0700   Not tainted  (6.10.0-rc3)\n    MSR:  8000000000029033 <SF,EE,ME,IR,DR,RI,LE>  CR: 2828220f  XER: 0000000e\n    CFAR: c0000000001fdc80 IRQMASK: 0\n    [ ... GPRs omitted ... ]\n    NIP [c0000000005d23d4] usercopy_abort+0x78/0xb0\n    LR [c0000000005d23d0] usercopy_abort+0x74/0xb0\n    Call Trace:\n     usercopy_abort+0x74/0xb0 (unreliable)\n     __check_heap_object+0xf8/0x120\n     check_heap_object+0x218/0x240\n     __check_object_size+0x84/0x1a4\n     dtl_file_read+0x17c/0x2c4\n     full_proxy_read+0x8c/0x110\n     vfs_read+0xdc/0x3a0\n     ksys_read+0x84/0x144\n     system_call_exception+0x124/0x330\n     system_call_vectored_common+0x15c/0x2ec\n    --- interrupt: 3000 at 0x7fff81f3ab34\n\nCommit 6d07d1cd300f (\"usercopy: Restrict non-usercopy caches to size 0\")\nrequires that only whitelisted areas in slab/slub objects can be copied to\nuserspace when usercopy hardening is enabled using CONFIG_HARDENED_USERCOPY.\nDtl contains hypervisor dispatch events which are expected to be read by\nprivileged users. Hence mark this safe for user access.\nSpecify useroffset=0 and usersize=DISPATCH_LOG_BYTES to whitelist the\nentire object.(CVE-2024-41065)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nKVM: PPC: Book3S HV: Prevent UAF in kvm_spapr_tce_attach_iommu_group()\n\nAl reported a possible use-after-free (UAF) in kvm_spapr_tce_attach_iommu_group().\n\nIt looks up `stt` from tablefd, but then continues to use it after doing\nfdput() on the returned fd. After the fdput() the tablefd is free to be\nclosed by another thread. The close calls kvm_spapr_tce_release() and\nthen release_spapr_tce_table() (via call_rcu()) which frees `stt`.\n\nAlthough there are calls to rcu_read_lock() in\nkvm_spapr_tce_attach_iommu_group() they are not sufficient to prevent\nthe UAF, because `stt` is used outside the locked regions.\n\nWith an artifcial delay after the fdput() and a userspace program which\ntriggers the race, KASAN detects the UAF:\n\n  BUG: KASAN: slab-use-after-free in kvm_spapr_tce_attach_iommu_group+0x298/0x720 [kvm]\n  Read of size 4 at addr c000200027552c30 by task kvm-vfio/2505\n  CPU: 54 PID: 2505 Comm: kvm-vfio Not tainted 6.10.0-rc3-next-20240612-dirty #1\n  Hardware name: 8335-GTH POWER9 0x4e1202 opal:skiboot-v6.5.3-35-g1851b2a06 PowerNV\n  Call Trace:\n    dump_stack_lvl+0xb4/0x108 (unreliable)\n    print_report+0x2b4/0x6ec\n    kasan_report+0x118/0x2b0\n    __asan_load4+0xb8/0xd0\n    kvm_spapr_tce_attach_iommu_group+0x298/0x720 [kvm]\n    kvm_vfio_set_attr+0x524/0xac0 [kvm]\n    kvm_device_ioctl+0x144/0x240 [kvm]\n    sys_ioctl+0x62c/0x1810\n    system_call_exception+0x190/0x440\n    system_call_vectored_common+0x15c/0x2ec\n  ...\n  Freed by task 0:\n   ...\n   kfree+0xec/0x3e0\n   release_spapr_tce_table+0xd4/0x11c [kvm]\n   rcu_core+0x568/0x16a0\n   handle_softirqs+0x23c/0x920\n   do_softirq_own_stack+0x6c/0x90\n   do_softirq_own_stack+0x58/0x90\n   __irq_exit_rcu+0x218/0x2d0\n   irq_exit+0x30/0x80\n   arch_local_irq_restore+0x128/0x230\n   arch_local_irq_enable+0x1c/0x30\n   cpuidle_enter_state+0x134/0x5cc\n   cpuidle_enter+0x6c/0xb0\n   call_cpuidle+0x7c/0x100\n   do_idle+0x394/0x410\n   cpu_startup_entry+0x60/0x70\n   start_secondary+0x3fc/0x410\n   start_secondary_prolog+0x10/0x14\n\nFix it by delaying the fdput() until `stt` is no longer in use, which\nis effectively the entire function. To keep the patch minimal add a call\nto fdput() at each of the existing return paths. Future work can convert\nthe function to goto or __cleanup style cleanup.\n\nWith the fix in place the test case no longer triggers the UAF.(CVE-2024-41070)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: qgroup: fix quota root leak after quota disable failure\n\nIf during the quota disable we fail when cleaning the quota tree or when\ndeleting the root from the root tree, we jump to the 'out' label without\never dropping the reference on the quota root, resulting in a leak of the\nroot since fs_info->quota_root is no longer pointing to the root (we have\nset it to NULL just before those steps).\n\nFix this by always doing a btrfs_put_root() call under the 'out' label.\nThis is a problem that exists since qgroups were first added in 2012 by\ncommit bed92eae26cc (\"Btrfs: qgroup implementation and prototypes\"), but\nback then we missed a kfree on the quota root and free_extent_buffer()\ncalls on its root and commit root nodes, since back then roots were not\nyet reference counted.(CVE-2024-41078)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nila: block BH in ila_output()\n\nAs explained in commit 1378817486d6 (\"tipc: block BH\nbefore using dst_cache\"), net/core/dst_cache.c\nhelpers need to be called with BH disabled.\n\nila_output() is called from lwtunnel_output()\npossibly from process context, and under rcu_read_lock().\n\nWe might be interrupted by a softirq, re-enter ila_output()\nand corrupt dst_cache data structures.\n\nFix the race by using local_bh_disable().(CVE-2024-41081)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\ndrm/nouveau/dispnv04: fix null pointer dereference in nv17_tv_get_hd_modes\n\nIn nv17_tv_get_hd_modes(), the return value of drm_mode_duplicate() is\nassigned to mode, which will lead to a possible NULL pointer dereference\non failure of drm_mode_duplicate(). The same applies to drm_cvt_mode().\nAdd a check to avoid null pointer dereference.(CVE-2024-41089)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\ndrm/nouveau/dispnv04: fix null pointer dereference in nv17_tv_get_ld_modes\n\nIn nv17_tv_get_ld_modes(), the return value of drm_mode_duplicate() is\nassigned to mode, which will lead to a possible NULL pointer dereference\non failure of drm_mode_duplicate(). Add a check to avoid npd.(CVE-2024-41095)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nusb: atm: cxacru: fix endpoint checking in cxacru_bind()\n\nSyzbot is still reporting quite an old issue [1] that occurs due to\nincomplete checking of present usb endpoints. As such, wrong\nendpoints types may be used at urb sumbitting stage which in turn\ntriggers a warning in usb_submit_urb().\n\nFix the issue by verifying that required endpoint types are present\nfor both in and out endpoints, taking into account cmd endpoint type.\n\nUnfortunately, this patch has not been tested on real hardware.\n\n[1] Syzbot report:\nusb 1-1: BOGUS urb xfer, pipe 1 != type 3\nWARNING: CPU: 0 PID: 8667 at drivers/usb/core/urb.c:502 usb_submit_urb+0xed2/0x18a0 drivers/usb/core/urb.c:502\nModules linked in:\nCPU: 0 PID: 8667 Comm: kworker/0:4 Not tainted 5.14.0-rc4-syzkaller #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011\nWorkqueue: usb_hub_wq hub_event\nRIP: 0010:usb_submit_urb+0xed2/0x18a0 drivers/usb/core/urb.c:502\n...\nCall Trace:\n cxacru_cm+0x3c0/0x8e0 drivers/usb/atm/cxacru.c:649\n cxacru_card_status+0x22/0xd0 drivers/usb/atm/cxacru.c:760\n cxacru_bind+0x7ac/0x11a0 drivers/usb/atm/cxacru.c:1209\n usbatm_usb_probe+0x321/0x1ae0 drivers/usb/atm/usbatm.c:1055\n cxacru_usb_probe+0xdf/0x1e0 drivers/usb/atm/cxacru.c:1363\n usb_probe_interface+0x315/0x7f0 drivers/usb/core/driver.c:396\n call_driver_probe drivers/base/dd.c:517 [inline]\n really_probe+0x23c/0xcd0 drivers/base/dd.c:595\n __driver_probe_device+0x338/0x4d0 drivers/base/dd.c:747\n driver_probe_device+0x4c/0x1a0 drivers/base/dd.c:777\n __device_attach_driver+0x20b/0x2f0 drivers/base/dd.c:894\n bus_for_each_drv+0x15f/0x1e0 drivers/base/bus.c:427\n __device_attach+0x228/0x4a0 drivers/base/dd.c:965\n bus_probe_device+0x1e4/0x290 drivers/base/bus.c:487\n device_add+0xc2f/0x2180 drivers/base/core.c:3354\n usb_set_configuration+0x113a/0x1910 drivers/usb/core/message.c:2170\n usb_generic_driver_probe+0xba/0x100 drivers/usb/core/generic.c:238\n usb_probe_device+0xd9/0x2c0 drivers/usb/core/driver.c:293(CVE-2024-41097)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nnet: can: j1939: Initialize unused data in j1939_send_one()\n\nsyzbot reported kernel-infoleak in raw_recvmsg() [1]. j1939_send_one()\ncreates full frame including unused data, but it doesn't initialize\nit. This causes the kernel-infoleak issue. Fix this by initializing\nunused data.\n\n[1]\nBUG: KMSAN: kernel-infoleak in instrument_copy_to_user include/linux/instrumented.h:114 [inline]\nBUG: KMSAN: kernel-infoleak in copy_to_user_iter lib/iov_iter.c:24 [inline]\nBUG: KMSAN: kernel-infoleak in iterate_ubuf include/linux/iov_iter.h:29 [inline]\nBUG: KMSAN: kernel-infoleak in iterate_and_advance2 include/linux/iov_iter.h:245 [inline]\nBUG: KMSAN: kernel-infoleak in iterate_and_advance include/linux/iov_iter.h:271 [inline]\nBUG: KMSAN: kernel-infoleak in _copy_to_iter+0x366/0x2520 lib/iov_iter.c:185\n instrument_copy_to_user include/linux/instrumented.h:114 [inline]\n copy_to_user_iter lib/iov_iter.c:24 [inline]\n iterate_ubuf include/linux/iov_iter.h:29 [inline]\n iterate_and_advance2 include/linux/iov_iter.h:245 [inline]\n iterate_and_advance include/linux/iov_iter.h:271 [inline]\n _copy_to_iter+0x366/0x2520 lib/iov_iter.c:185\n copy_to_iter include/linux/uio.h:196 [inline]\n memcpy_to_msg include/linux/skbuff.h:4113 [inline]\n raw_recvmsg+0x2b8/0x9e0 net/can/raw.c:1008\n sock_recvmsg_nosec net/socket.c:1046 [inline]\n sock_recvmsg+0x2c4/0x340 net/socket.c:1068\n ____sys_recvmsg+0x18a/0x620 net/socket.c:2803\n ___sys_recvmsg+0x223/0x840 net/socket.c:2845\n do_recvmmsg+0x4fc/0xfd0 net/socket.c:2939\n __sys_recvmmsg net/socket.c:3018 [inline]\n __do_sys_recvmmsg net/socket.c:3041 [inline]\n __se_sys_recvmmsg net/socket.c:3034 [inline]\n __x64_sys_recvmmsg+0x397/0x490 net/socket.c:3034\n x64_sys_call+0xf6c/0x3b50 arch/x86/include/generated/asm/syscalls_64.h:300\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0xcf/0x1e0 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n\nUninit was created at:\n slab_post_alloc_hook mm/slub.c:3804 [inline]\n slab_alloc_node mm/slub.c:3845 [inline]\n kmem_cache_alloc_node+0x613/0xc50 mm/slub.c:3888\n kmalloc_reserve+0x13d/0x4a0 net/core/skbuff.c:577\n __alloc_skb+0x35b/0x7a0 net/core/skbuff.c:668\n alloc_skb include/linux/skbuff.h:1313 [inline]\n alloc_skb_with_frags+0xc8/0xbf0 net/core/skbuff.c:6504\n sock_alloc_send_pskb+0xa81/0xbf0 net/core/sock.c:2795\n sock_alloc_send_skb include/net/sock.h:1842 [inline]\n j1939_sk_alloc_skb net/can/j1939/socket.c:878 [inline]\n j1939_sk_send_loop net/can/j1939/socket.c:1142 [inline]\n j1939_sk_sendmsg+0xc0a/0x2730 net/can/j1939/socket.c:1277\n sock_sendmsg_nosec net/socket.c:730 [inline]\n __sock_sendmsg+0x30f/0x380 net/socket.c:745\n ____sys_sendmsg+0x877/0xb60 net/socket.c:2584\n ___sys_sendmsg+0x28d/0x3c0 net/socket.c:2638\n __sys_sendmsg net/socket.c:2667 [inline]\n __do_sys_sendmsg net/socket.c:2676 [inline]\n __se_sys_sendmsg net/socket.c:2674 [inline]\n __x64_sys_sendmsg+0x307/0x4a0 net/socket.c:2674\n x64_sys_call+0xc4b/0x3b50 arch/x86/include/generated/asm/syscalls_64.h:47\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0xcf/0x1e0 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n\nBytes 12-15 of 16 are uninitialized\nMemory access of size 16 starts at ffff888120969690\nData copied to user address 00000000200017c0\n\nCPU: 1 PID: 5050 Comm: syz-executor198 Not tainted 6.9.0-rc5-syzkaller-00031-g71b1543c83d6 #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024(CVE-2024-42076)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nocfs2: fix DIO failure due to insufficient transaction credits\n\nThe code in ocfs2_dio_end_io_write() estimates number of necessary\ntransaction credits using ocfs2_calc_extend_credits().  This however does\nnot take into account that the IO could be arbitrarily large and can\ncontain arbitrary number of extents.\n\nExtent tree manipulations do often extend the current transaction but not\nin all of the cases.  For example if we have only single block extents in\nthe tree, ocfs2_mark_extent_written() will end up calling\nocfs2_replace_extent_rec() all the time and we will never extend the\ncurrent transaction and eventually exhaust all the transaction credits if\nthe IO contains many single block extents.  Once that happens a\nWARN_ON(jbd2_handle_buffer_credits(handle) <= 0) is triggered in\njbd2_journal_dirty_metadata() and subsequently OCFS2 aborts in response to\nthis error.  This was actually triggered by one of our customers on a\nheavily fragmented OCFS2 filesystem.\n\nTo fix the issue make sure the transaction always has enough credits for\none extent insert before each call of ocfs2_mark_extent_written().\n\nHeming Zhao said:\n\n------\nPANIC: \"Kernel panic - not syncing: OCFS2: (device dm-1): panic forced after error\"\n\nPID: xxx  TASK: xxxx  CPU: 5  COMMAND: \"SubmitThread-CA\"\n  #0 machine_kexec at ffffffff8c069932\n  #1 __crash_kexec at ffffffff8c1338fa\n  #2 panic at ffffffff8c1d69b9\n  #3 ocfs2_handle_error at ffffffffc0c86c0c [ocfs2]\n  #4 __ocfs2_abort at ffffffffc0c88387 [ocfs2]\n  #5 ocfs2_journal_dirty at ffffffffc0c51e98 [ocfs2]\n  #6 ocfs2_split_extent at ffffffffc0c27ea3 [ocfs2]\n  #7 ocfs2_change_extent_flag at ffffffffc0c28053 [ocfs2]\n  #8 ocfs2_mark_extent_written at ffffffffc0c28347 [ocfs2]\n  #9 ocfs2_dio_end_io_write at ffffffffc0c2bef9 [ocfs2]\n#10 ocfs2_dio_end_io at ffffffffc0c2c0f5 [ocfs2]\n#11 dio_complete at ffffffff8c2b9fa7\n#12 do_blockdev_direct_IO at ffffffff8c2bc09f\n#13 ocfs2_direct_IO at ffffffffc0c2b653 [ocfs2]\n#14 generic_file_direct_write at ffffffff8c1dcf14\n#15 __generic_file_write_iter at ffffffff8c1dd07b\n#16 ocfs2_file_write_iter at ffffffffc0c49f1f [ocfs2]\n#17 aio_write at ffffffff8c2cc72e\n#18 kmem_cache_alloc at ffffffff8c248dde\n#19 do_io_submit at ffffffff8c2ccada\n#20 do_syscall_64 at ffffffff8c004984\n#21 entry_SYSCALL_64_after_hwframe at ffffffff8c8000ba(CVE-2024-42077)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/restrack: Fix potential invalid address access\n\nstruct rdma_restrack_entry's kern_name was set to KBUILD_MODNAME\nin ib_create_cq(), while if the module exited but forgot del this\nrdma_restrack_entry, it would cause a invalid address access in\nrdma_restrack_clean() when print the owner of this rdma_restrack_entry.\n\nThese code is used to help find one forgotten PD release in one of the\nULPs. But it is not needed anymore, so delete them.(CVE-2024-42080)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nxdp: Remove WARN() from __xdp_reg_mem_model()\n\nsyzkaller reports a warning in __xdp_reg_mem_model().\n\nThe warning occurs only if __mem_id_init_hash_table() returns an error. It\nreturns the error in two cases:\n\n  1. memory allocation fails;\n  2. rhashtable_init() fails when some fields of rhashtable_params\n     struct are not initialized properly.\n\nThe second case cannot happen since there is a static const rhashtable_params\nstruct with valid fields. So, warning is only triggered when there is a\nproblem with memory allocation.\n\nThus, there is no sense in using WARN() to handle this error and it can be\nsafely removed.\n\nWARNING: CPU: 0 PID: 5065 at net/core/xdp.c:299 __xdp_reg_mem_model+0x2d9/0x650 net/core/xdp.c:299\n\nCPU: 0 PID: 5065 Comm: syz-executor883 Not tainted 6.8.0-syzkaller-05271-gf99c5f563c17 #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024\nRIP: 0010:__xdp_reg_mem_model+0x2d9/0x650 net/core/xdp.c:299\n\nCall Trace:\n xdp_reg_mem_model+0x22/0x40 net/core/xdp.c:344\n xdp_test_run_setup net/bpf/test_run.c:188 [inline]\n bpf_test_run_xdp_live+0x365/0x1e90 net/bpf/test_run.c:377\n bpf_prog_test_run_xdp+0x813/0x11b0 net/bpf/test_run.c:1267\n bpf_prog_test_run+0x33a/0x3b0 kernel/bpf/syscall.c:4240\n __sys_bpf+0x48d/0x810 kernel/bpf/syscall.c:5649\n __do_sys_bpf kernel/bpf/syscall.c:5738 [inline]\n __se_sys_bpf kernel/bpf/syscall.c:5736 [inline]\n __x64_sys_bpf+0x7c/0x90 kernel/bpf/syscall.c:5736\n do_syscall_64+0xfb/0x240\n entry_SYSCALL_64_after_hwframe+0x6d/0x75\n\nFound by Linux Verification Center (linuxtesting.org) with syzkaller.(CVE-2024-42082)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nftruncate: pass a signed offset\n\nThe old ftruncate() syscall, using the 32-bit off_t misses a sign\nextension when called in compat mode on 64-bit architectures.  As a\nresult, passing a negative length accidentally succeeds in truncating\nto file size between 2GiB and 4GiB.\n\nChanging the type of the compat syscall to the signed compat_off_t\nchanges the behavior so it instead returns -EINVAL.\n\nThe native entry point, the truncate() syscall and the corresponding\nloff_t based variants are all correct already and do not suffer\nfrom this mistake.(CVE-2024-42084)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\ndrm/panel: ilitek-ili9881c: Fix warning with GPIO controllers that sleep\n\nThe ilitek-ili9881c controls the reset GPIO using the non-sleeping\ngpiod_set_value() function. This complains loudly when the GPIO\ncontroller needs to sleep. As the caller can sleep, use\ngpiod_set_value_cansleep() to fix the issue.(CVE-2024-42087)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nASoC: fsl-asoc-card: set priv->pdev before using it\n\npriv->pdev pointer was set after being used in\nfsl_asoc_card_audmux_init().\nMove this assignment at the start of the probe function, so\nsub-functions can correctly use pdev through priv.\n\nfsl_asoc_card_audmux_init() dereferences priv->pdev to get access to the\ndev struct, used with dev_err macros.\nAs priv is zero-initialised, there would be a NULL pointer dereference.\nNote that if priv->dev is dereferenced before assignment but never used,\nfor example if there is no error to be printed, the driver won't crash\nprobably due to compiler optimisations.(CVE-2024-42089)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\npinctrl: fix deadlock in create_pinctrl() when handling -EPROBE_DEFER\n\nIn create_pinctrl(), pinctrl_maps_mutex is acquired before calling\nadd_setting(). If add_setting() returns -EPROBE_DEFER, create_pinctrl()\ncalls pinctrl_free(). However, pinctrl_free() attempts to acquire\npinctrl_maps_mutex, which is already held by create_pinctrl(), leading to\na potential deadlock.\n\nThis patch resolves the issue by releasing pinctrl_maps_mutex before\ncalling pinctrl_free(), preventing the deadlock.\n\nThis bug was discovered and resolved using Coverity Static Analysis\nSecurity Testing (SAST) by Synopsys, Inc.(CVE-2024-42090)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\ngpio: davinci: Validate the obtained number of IRQs\n\nValue of pdata->gpio_unbanked is taken from Device Tree. In case of broken\nDT due to any error this value can be any. Without this value validation\nthere can be out of chips->irqs array boundaries access in\ndavinci_gpio_probe().\n\nValidate the obtained nirq value so that it won't exceed the maximum\nnumber of IRQs per bank.\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE.(CVE-2024-42092)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nnet/dpaa2: Avoid explicit cpumask var allocation on stack\n\nFor CONFIG_CPUMASK_OFFSTACK=y kernel, explicit allocation of cpumask\nvariable on stack is not recommended since it can cause potential stack\noverflow.\n\nInstead, kernel code should always use *cpumask_var API(s) to allocate\ncpumask var in config-neutral way, leaving allocation strategy to\nCONFIG_CPUMASK_OFFSTACK.\n\nUse *cpumask_var API(s) to address it.(CVE-2024-42093)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nnet/iucv: Avoid explicit cpumask var allocation on stack\n\nFor CONFIG_CPUMASK_OFFSTACK=y kernel, explicit allocation of cpumask\nvariable on stack is not recommended since it can cause potential stack\noverflow.\n\nInstead, kernel code should always use *cpumask_var API(s) to allocate\ncpumask var in config-neutral way, leaving allocation strategy to\nCONFIG_CPUMASK_OFFSTACK.\n\nUse *cpumask_var API(s) to address it.(CVE-2024-42094)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nserial: 8250_omap: Implementation of Errata i2310\n\nAs per Errata i2310[0], Erroneous timeout can be triggered,\nif this Erroneous interrupt is not cleared then it may leads\nto storm of interrupts, therefore apply Errata i2310 solution.\n\n[0] https://www.ti.com/lit/pdf/sprz536 page 23(CVE-2024-42095)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nx86: stop playing stack games in profile_pc()\n\nThe 'profile_pc()' function is used for timer-based profiling, which\nisn't really all that relevant any more to begin with, but it also ends\nup making assumptions based on the stack layout that aren't necessarily\nvalid.\n\nBasically, the code tries to account the time spent in spinlocks to the\ncaller rather than the spinlock, and while I support that as a concept,\nit's not worth the code complexity or the KASAN warnings when no serious\nprofiling is done using timers anyway these days.\n\nAnd the code really does depend on stack layout that is only true in the\nsimplest of cases.  We've lost the comment at some point (I think when\nthe 32-bit and 64-bit code was unified), but it used to say:\n\n\tAssume the lock function has either no stack frame or a copy\n\tof eflags from PUSHF.\n\nwhich explains why it just blindly loads a word or two straight off the\nstack pointer and then takes a minimal look at the values to just check\nif they might be eflags or the return pc:\n\n\tEflags always has bits 22 and up cleared unlike kernel addresses\n\nbut that basic stack layout assumption assumes that there isn't any lock\ndebugging etc going on that would complicate the code and cause a stack\nframe.\n\nIt causes KASAN unhappiness reported for years by syzkaller [1] and\nothers [2].\n\nWith no real practical reason for this any more, just remove the code.\n\nJust for historical interest, here's some background commits relating to\nthis code from 2006:\n\n  0cb91a229364 (\"i386: Account spinlocks to the caller during profiling for !FP kernels\")\n  31679f38d886 (\"Simplify profile_pc on x86-64\")\n\nand a code unification from 2009:\n\n  ef4512882dbe (\"x86: time_32/64.c unify profile_pc\")\n\nbut the basics of this thing actually goes back to before the git tree.(CVE-2024-42096)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: ecdh - explicitly zeroize private_key\n\nprivate_key is overwritten with the key parameter passed in by the\ncaller (if present), or alternatively a newly generated private key.\nHowever, it is possible that the caller provides a key (or the newly\ngenerated key) which is shorter than the previous key. In that\nscenario, some key material from the previous key would not be\noverwritten. The easiest solution is to explicitly zeroize the entire\nprivate_key array first.\n\nNote that this patch slightly changes the behavior of this function:\npreviously, if the ecc_gen_privkey failed, the old private_key would\nremain. Now, the private_key is always zeroized. This behavior is\nconsistent with the case where params.key is set and ecc_is_key_valid\nfails.(CVE-2024-42098)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\ninet_diag: Initialize pad field in struct inet_diag_req_v2\n\nKMSAN reported uninit-value access in raw_lookup() [1]. Diag for raw\nsockets uses the pad field in struct inet_diag_req_v2 for the\nunderlying protocol. This field corresponds to the sdiag_raw_protocol\nfield in struct inet_diag_req_raw.\n\ninet_diag_get_exact_compat() converts inet_diag_req to\ninet_diag_req_v2, but leaves the pad field uninitialized. So the issue\noccurs when raw_lookup() accesses the sdiag_raw_protocol field.\n\nFix this by initializing the pad field in\ninet_diag_get_exact_compat(). Also, do the same fix in\ninet_diag_dump_compat() to avoid the similar issue in the future.\n\n[1]\nBUG: KMSAN: uninit-value in raw_lookup net/ipv4/raw_diag.c:49 [inline]\nBUG: KMSAN: uninit-value in raw_sock_get+0x657/0x800 net/ipv4/raw_diag.c:71\n raw_lookup net/ipv4/raw_diag.c:49 [inline]\n raw_sock_get+0x657/0x800 net/ipv4/raw_diag.c:71\n raw_diag_dump_one+0xa1/0x660 net/ipv4/raw_diag.c:99\n inet_diag_cmd_exact+0x7d9/0x980\n inet_diag_get_exact_compat net/ipv4/inet_diag.c:1404 [inline]\n inet_diag_rcv_msg_compat+0x469/0x530 net/ipv4/inet_diag.c:1426\n sock_diag_rcv_msg+0x23d/0x740 net/core/sock_diag.c:282\n netlink_rcv_skb+0x537/0x670 net/netlink/af_netlink.c:2564\n sock_diag_rcv+0x35/0x40 net/core/sock_diag.c:297\n netlink_unicast_kernel net/netlink/af_netlink.c:1335 [inline]\n netlink_unicast+0xe74/0x1240 net/netlink/af_netlink.c:1361\n netlink_sendmsg+0x10c6/0x1260 net/netlink/af_netlink.c:1905\n sock_sendmsg_nosec net/socket.c:730 [inline]\n __sock_sendmsg+0x332/0x3d0 net/socket.c:745\n ____sys_sendmsg+0x7f0/0xb70 net/socket.c:2585\n ___sys_sendmsg+0x271/0x3b0 net/socket.c:2639\n __sys_sendmsg net/socket.c:2668 [inline]\n __do_sys_sendmsg net/socket.c:2677 [inline]\n __se_sys_sendmsg net/socket.c:2675 [inline]\n __x64_sys_sendmsg+0x27e/0x4a0 net/socket.c:2675\n x64_sys_call+0x135e/0x3ce0 arch/x86/include/generated/asm/syscalls_64.h:47\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0xd9/0x1e0 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n\nUninit was stored to memory at:\n raw_sock_get+0x650/0x800 net/ipv4/raw_diag.c:71\n raw_diag_dump_one+0xa1/0x660 net/ipv4/raw_diag.c:99\n inet_diag_cmd_exact+0x7d9/0x980\n inet_diag_get_exact_compat net/ipv4/inet_diag.c:1404 [inline]\n inet_diag_rcv_msg_compat+0x469/0x530 net/ipv4/inet_diag.c:1426\n sock_diag_rcv_msg+0x23d/0x740 net/core/sock_diag.c:282\n netlink_rcv_skb+0x537/0x670 net/netlink/af_netlink.c:2564\n sock_diag_rcv+0x35/0x40 net/core/sock_diag.c:297\n netlink_unicast_kernel net/netlink/af_netlink.c:1335 [inline]\n netlink_unicast+0xe74/0x1240 net/netlink/af_netlink.c:1361\n netlink_sendmsg+0x10c6/0x1260 net/netlink/af_netlink.c:1905\n sock_sendmsg_nosec net/socket.c:730 [inline]\n __sock_sendmsg+0x332/0x3d0 net/socket.c:745\n ____sys_sendmsg+0x7f0/0xb70 net/socket.c:2585\n ___sys_sendmsg+0x271/0x3b0 net/socket.c:2639\n __sys_sendmsg net/socket.c:2668 [inline]\n __do_sys_sendmsg net/socket.c:2677 [inline]\n __se_sys_sendmsg net/socket.c:2675 [inline]\n __x64_sys_sendmsg+0x27e/0x4a0 net/socket.c:2675\n x64_sys_call+0x135e/0x3ce0 arch/x86/include/generated/asm/syscalls_64.h:47\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0xd9/0x1e0 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n\nLocal variable req.i created at:\n inet_diag_get_exact_compat net/ipv4/inet_diag.c:1396 [inline]\n inet_diag_rcv_msg_compat+0x2a6/0x530 net/ipv4/inet_diag.c:1426\n sock_diag_rcv_msg+0x23d/0x740 net/core/sock_diag.c:282\n\nCPU: 1 PID: 8888 Comm: syz-executor.6 Not tainted 6.10.0-rc4-00217-g35bb670d65fc #32\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.3-2.fc40 04/01/2014(CVE-2024-42106)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Skip finding free audio for unknown engine_id\n\n[WHY]\nENGINE_ID_UNKNOWN = -1 and can not be used as an array index. Plus, it\nalso means it is uninitialized and does not need free audio.\n\n[HOW]\nSkip and return NULL.\n\nThis fixes 2 OVERRUN issues reported by Coverity.(CVE-2024-42119)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nscsi: qedf: Make qedf_execute_tmf() non-preemptible\n\nStop calling smp_processor_id() from preemptible code in\nqedf_execute_tmf90.  This results in BUG_ON() when running an RT kernel.\n\n[ 659.343280] BUG: using smp_processor_id() in preemptible [00000000] code: sg_reset/3646\n[ 659.343282] caller is qedf_execute_tmf+0x8b/0x360 [qedf](CVE-2024-42124)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: qca: Fix BT enable failure again for QCA6390 after warm reboot\n\nCommit 272970be3dab (\"Bluetooth: hci_qca: Fix driver shutdown on closed\nserdev\") will cause below regression issue:\n\nBT can't be enabled after below steps:\ncold boot -> enable BT -> disable BT -> warm reboot -> BT enable failure\nif property enable-gpios is not configured within DT|ACPI for QCA6390.\n\nThe commit is to fix a use-after-free issue within qca_serdev_shutdown()\nby adding condition to avoid the serdev is flushed or wrote after closed\nbut also introduces this regression issue regarding above steps since the\nVSC is not sent to reset controller during warm reboot.\n\nFixed by sending the VSC to reset controller within qca_serdev_shutdown()\nonce BT was ever enabled, and the use-after-free issue is also fixed by\nthis change since the serdev is still opened before it is flushed or wrote.\n\nVerified by the reported machine Dell XPS 13 9310 laptop over below two\nkernel commits:\ncommit e00fc2700a3f (\"Bluetooth: btusb: Fix triggering coredump\nimplementation for QCA\") of bluetooth-next tree.\ncommit b23d98d46d28 (\"Bluetooth: btusb: Fix triggering coredump\nimplementation for QCA\") of linus mainline tree.(CVE-2024-42137)\n\nRejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.(CVE-2024-42143)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nIB/core: Implement a limit on UMAD receive List\n\nThe existing behavior of ib_umad, which maintains received MAD\npackets in an unbounded list, poses a risk of uncontrolled growth.\nAs user-space applications extract packets from this list, the rate\nof extraction may not match the rate of incoming packets, leading\nto potential list overflow.\n\nTo address this, we introduce a limit to the size of the list. After\nconsidering typical scenarios, such as OpenSM processing, which can\nhandle approximately 100k packets per second, and the 1-second retry\ntimeout for most packets, we set the list size limit to 200k. Packets\nreceived beyond this limit are dropped, assuming they are likely timed\nout by the time they are handled by user-space.\n\nNotably, packets queued on the receive list due to reasons like\ntimed-out sends are preserved even when the list is full.(CVE-2024-42145)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nbnx2x: Fix multiple UBSAN array-index-out-of-bounds\n\nFix UBSAN warnings that occur when using a system with 32 physical\ncpu cores or more, or when the user defines a number of Ethernet\nqueues greater than or equal to FP_SB_MAX_E1x using the num_queues\nmodule parameter.\n\nCurrently there is a read/write out of bounds that occurs on the array\n\"struct stats_query_entry query\" present inside the \"bnx2x_fw_stats_req\"\nstruct in \"drivers/net/ethernet/broadcom/bnx2x/bnx2x.h\".\nLooking at the definition of the \"struct stats_query_entry query\" array:\n\nstruct stats_query_entry query[FP_SB_MAX_E1x+\n         BNX2X_FIRST_QUEUE_QUERY_IDX];\n\nFP_SB_MAX_E1x is defined as the maximum number of fast path interrupts and\nhas a value of 16, while BNX2X_FIRST_QUEUE_QUERY_IDX has a value of 3\nmeaning the array has a total size of 19.\nSince accesses to \"struct stats_query_entry query\" are offset-ted by\nBNX2X_FIRST_QUEUE_QUERY_IDX, that means that the total number of Ethernet\nqueues should not exceed FP_SB_MAX_E1x (16). However one of these queues\nis reserved for FCOE and thus the number of Ethernet queues should be set\nto [FP_SB_MAX_E1x -1] (15) if FCOE is enabled or [FP_SB_MAX_E1x] (16) if\nit is not.\n\nThis is also described in a comment in the source code in\ndrivers/net/ethernet/broadcom/bnx2x/bnx2x.h just above the Macro definition\nof FP_SB_MAX_E1x. Below is the part of this explanation that it important\nfor this patch\n\n/*\n  * The total number of L2 queues, MSIX vectors and HW contexts (CIDs) is\n  * control by the number of fast-path status blocks supported by the\n  * device (HW/FW). Each fast-path status block (FP-SB) aka non-default\n  * status block represents an independent interrupts context that can\n  * serve a regular L2 networking queue. However special L2 queues such\n  * as the FCoE queue do not require a FP-SB and other components like\n  * the CNIC may consume FP-SB reducing the number of possible L2 queues\n  *\n  * If the maximum number of FP-SB available is X then:\n  * a. If CNIC is supported it consumes 1 FP-SB thus the max number of\n  *    regular L2 queues is Y=X-1\n  * b. In MF mode the actual number of L2 queues is Y= (X-1/MF_factor)\n  * c. If the FCoE L2 queue is supported the actual number of L2 queues\n  *    is Y+1\n  * d. The number of irqs (MSIX vectors) is either Y+1 (one extra for\n  *    slow-path interrupts) or Y+2 if CNIC is supported (one additional\n  *    FP interrupt context for the CNIC).\n  * e. The number of HW context (CID count) is always X or X+1 if FCoE\n  *    L2 queue is supported. The cid for the FCoE L2 queue is always X.\n  */\n\nHowever this driver also supports NICs that use the E2 controller which can\nhandle more queues due to having more FP-SB represented by FP_SB_MAX_E2.\nLooking at the commits when the E2 support was added, it was originally\nusing the E1x parameters: commit f2e0899f0f27 (\"bnx2x: Add 57712 support\").\nBack then FP_SB_MAX_E2 was set to 16 the same as E1x. However the driver\nwas later updated to take full advantage of the E2 instead of having it be\nlimited to the capabilities of the E1x. But as far as we can tell, the\narray \"stats_query_entry query\" was still limited to using the FP-SB\navailable to the E1x cards as part of an oversignt when the driver was\nupdated to take full advantage of the E2, and now with the driver being\naware of the greater queue size supported by E2 NICs, it causes the UBSAN\nwarnings seen in the stack traces below.\n\nThis patch increases the size of the \"stats_query_entry query\" array by\nreplacing FP_SB_MAX_E1x with FP_SB_MAX_E2 to be large enough to handle\nboth types of NICs.\n\nStack traces:\n\nUBSAN: array-index-out-of-bounds in\n       drivers/net/ethernet/broadcom/bnx2x/bnx2x_stats.c:1529:11\nindex 20 is out of range for type 'stats_query_entry [19]'\nCPU: 12 PID: 858 Comm: systemd-network Not tainted 6.9.0-060900rc7-generic\n\t     #202405052133\nHardware name: HP ProLiant DL360 Gen9/ProLiant DL360 \n---truncated---(CVE-2024-42148)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nUSB: serial: mos7840: fix crash on resume\n\nSince commit c49cfa917025 (\"USB: serial: use generic method if no\nalternative is provided in usb serial layer\"), USB serial core calls the\ngeneric resume implementation when the driver has not provided one.\n\nThis can trigger a crash on resume with mos7840 since support for\nmultiple read URBs was added back in 2011. Specifically, both port read\nURBs are now submitted on resume for open ports, but the context pointer\nof the second URB is left set to the core rather than mos7840 port\nstructure.\n\nFix this by implementing dedicated suspend and resume functions for\nmos7840.\n\nTested with Delock 87414 USB 2.0 to 4x serial adapter.\n\n[ johan: analyse crash and rewrite commit message; set busy flag on\n         resume; drop bulk-in check; drop unnecessary usb_kill_urb() ](CVE-2024-42244)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nnet, sunrpc: Remap EPERM in case of connection failure in xs_tcp_setup_socket\n\nWhen using a BPF program on kernel_connect(), the call can return -EPERM. This\ncauses xs_tcp_setup_socket() to loop forever, filling up the syslog and causing\nthe kernel to potentially freeze up.\n\nNeil suggested:\n\n  This will propagate -EPERM up into other layers which might not be ready\n  to handle it. It might be safer to map EPERM to an error we would be more\n  likely to expect from the network system - such as ECONNREFUSED or ENETDOWN.\n\nECONNREFUSED as error seems reasonable. For programs setting a different error\ncan be out of reach (see handling in 4fbac77d2d09) in particular on kernels\nwhich do not have f10d05966196 (\"bpf: Make BPF_PROG_RUN_ARRAY return -err\ninstead of allow boolean\"), thus given that it is better to simply remap for\nconsistent behavior. UDP does handle EPERM in xs_udp_send_request().(CVE-2024-42246)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Fix a segment issue when downgrading gso_size\n\nLinearize the skb when downgrading gso_size because it may trigger a\nBUG_ON() later when the skb is segmented as described in [1,2].(CVE-2024-42281)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nscsi: qla2xxx: Fix for possible memory corruption\n\nInit Control Block is dereferenced incorrectly.  Correctly dereference ICB(CVE-2024-42288)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\next4: make sure the first directory block is not a hole\n\nThe syzbot constructs a directory that has no dirblock but is non-inline,\ni.e. the first directory block is a hole. And no errors are reported when\ncreating files in this directory in the following flow.\n\n    ext4_mknod\n     ...\n      ext4_add_entry\n        // Read block 0\n        ext4_read_dirblock(dir, block, DIRENT)\n          bh = ext4_bread(NULL, inode, block, 0)\n          if (!bh && (type == INDEX || type == DIRENT_HTREE))\n          // The first directory block is a hole\n          // But type == DIRENT, so no error is reported.\n\nAfter that, we get a directory block without '.' and '..' but with a valid\ndentry. This may cause some code that relies on dot or dotdot (such as\nmake_indexed_dir()) to crash.\n\nTherefore when ext4_read_dirblock() finds that the first directory block\nis a hole report that the filesystem is corrupted and return an error to\navoid loading corrupted data from disk causing something bad.(CVE-2024-42304)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\ndrm/gma500: fix null pointer dereference in cdv_intel_lvds_get_modes\n\nIn cdv_intel_lvds_get_modes(), the return value of drm_mode_duplicate()\nis assigned to mode, which will lead to a NULL pointer dereference on\nfailure of drm_mode_duplicate(). Add a check to avoid npd.(CVE-2024-42310)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nlandlock: Don't lose track of restrictions on cred_transfer\n\nWhen a process' cred struct is replaced, this _almost_ always invokes\nthe cred_prepare LSM hook; but in one special case (when\nKEYCTL_SESSION_TO_PARENT updates the parent's credentials), the\ncred_transfer LSM hook is used instead.  Landlock only implements the\ncred_prepare hook, not cred_transfer, so KEYCTL_SESSION_TO_PARENT causes\nall information on Landlock restrictions to be lost.\n\nThis basically means that a process with the ability to use the fork()\nand keyctl() syscalls can get rid of all Landlock restrictions on\nitself.\n\nFix it by adding a cred_transfer hook that does the same thing as the\nexisting cred_prepare hook. (Implemented by having hook_cred_prepare()\ncall hook_cred_transfer() so that the two functions are less likely to\naccidentally diverge in the future.)(CVE-2024-42318)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nbna: adjust 'name' buf size of bna_tcb and bna_ccb structures\n\nTo have enough space to write all possible sprintf() args. Currently\n'name' size is 16, but the first '%s' specifier may already need at\nleast 16 characters, since 'bnad->netdev->name' is used there.\n\nFor '%d' specifiers, assume that they require:\n * 1 char for 'tx_id + tx_info->tcb[i]->id' sum, BNAD_MAX_TXQ_PER_TX is 8\n * 2 chars for 'rx_id + rx_info->rx_ctrl[i].ccb->id', BNAD_MAX_RXP_PER_RX\n   is 16\n\nAnd replace sprintf with snprintf.\n\nDetected using the static analysis tool - Svace.(CVE-2024-43839)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nblock: initialize integrity buffer to zero before writing it to media\n\nMetadata added by bio_integrity_prep is using plain kmalloc, which leads\nto random kernel memory being written media.  For PI metadata this is\nlimited to the app tag that isn't used by kernel generated metadata,\nbut for non-PI metadata the entire buffer leaks kernel memory.\n\nFix this by adding the __GFP_ZERO flag to allocations for writes.(CVE-2024-43854)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nwifi: cfg80211: handle 2x996 RU allocation in cfg80211_calculate_bitrate_he()\n\nCurrently NL80211_RATE_INFO_HE_RU_ALLOC_2x996 is not handled in\ncfg80211_calculate_bitrate_he(), leading to below warning:\n\nkernel: invalid HE MCS: bw:6, ru:6\nkernel: WARNING: CPU: 0 PID: 2312 at net/wireless/util.c:1501 cfg80211_calculate_bitrate_he+0x22b/0x270 [cfg80211]\n\nFix it by handling 2x996 RU allocation in the same way as 160 MHz bandwidth.(CVE-2024-43879)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: ctnetlink: use helper function to calculate expect ID\n\nDelete expectation path is missing a call to the nf_expect_get_id()\nhelper function to calculate the expectation ID, otherwise LSB of the\nexpectation object address is leaked to userspace.(CVE-2024-44944)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nxhci: Fix Panther point NULL pointer deref at full-speed re-enumeration\n\nre-enumerating full-speed devices after a failed address device command\ncan trigger a NULL pointer dereference.\n\nFull-speed devices may need to reconfigure the endpoint 0 Max Packet Size\nvalue during enumeration. Usb core calls usb_ep0_reinit() in this case,\nwhich ends up calling xhci_configure_endpoint().\n\nOn Panther point xHC the xhci_configure_endpoint() function will\nadditionally check and reserve bandwidth in software. Other hosts do\nthis in hardware\n\nIf xHC address device command fails then a new xhci_virt_device structure\nis allocated as part of re-enabling the slot, but the bandwidth table\npointers are not set up properly here.\nThis triggers the NULL pointer dereference the next time usb_ep0_reinit()\nis called and xhci_configure_endpoint() tries to check and reserve\nbandwidth\n\n[46710.713538] usb 3-1: new full-speed USB device number 5 using xhci_hcd\n[46710.713699] usb 3-1: Device not responding to setup address.\n[46710.917684] usb 3-1: Device not responding to setup address.\n[46711.125536] usb 3-1: device not accepting address 5, error -71\n[46711.125594] BUG: kernel NULL pointer dereference, address: 0000000000000008\n[46711.125600] #PF: supervisor read access in kernel mode\n[46711.125603] #PF: error_code(0x0000) - not-present page\n[46711.125606] PGD 0 P4D 0\n[46711.125610] Oops: Oops: 0000 [#1] PREEMPT SMP PTI\n[46711.125615] CPU: 1 PID: 25760 Comm: kworker/1:2 Not tainted 6.10.3_2 #1\n[46711.125620] Hardware name: Gigabyte Technology Co., Ltd.\n[46711.125623] Workqueue: usb_hub_wq hub_event [usbcore]\n[46711.125668] RIP: 0010:xhci_reserve_bandwidth (drivers/usb/host/xhci.c\n\nFix this by making sure bandwidth table pointers are set up correctly\nafter a failed address device command, and additionally by avoiding\nchecking for bandwidth in cases like this where no actual endpoints are\nadded or removed, i.e. only context for default control endpoint 0 is\nevaluated.(CVE-2024-45006)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nKVM: arm64: Make ICC_*SGI*_EL1 undef in the absence of a vGICv3\n\nOn a system with a GICv3, if a guest hasn't been configured with\nGICv3 and that the host is not capable of GICv2 emulation,\na write to any of the ICC_*SGI*_EL1 registers is trapped to EL2.\n\nWe therefore try to emulate the SGI access, only to hit a NULL\npointer as no private interrupt is allocated (no GIC, remember?).\n\nThe obvious fix is to give the guest what it deserves, in the\nshape of a UNDEF exception.(CVE-2024-46707)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nice: Add netif_device_attach/detach into PF reset flow\n\nEthtool callbacks can be executed while reset is in progress and try to\naccess deleted resources, e.g. getting coalesce settings can result in a\nNULL pointer dereference seen below.\n\nReproduction steps:\nOnce the driver is fully initialized, trigger reset:\n\t# echo 1 > /sys/class/net/<interface>/device/reset\nwhen reset is in progress try to get coalesce settings using ethtool:\n\t# ethtool -c <interface>\n\nBUG: kernel NULL pointer dereference, address: 0000000000000020\nPGD 0 P4D 0\nOops: Oops: 0000 [#1] PREEMPT SMP PTI\nCPU: 11 PID: 19713 Comm: ethtool Tainted: G S                 6.10.0-rc7+ #7\nRIP: 0010:ice_get_q_coalesce+0x2e/0xa0 [ice]\nRSP: 0018:ffffbab1e9bcf6a8 EFLAGS: 00010206\nRAX: 000000000000000c RBX: ffff94512305b028 RCX: 0000000000000000\nRDX: 0000000000000000 RSI: ffff9451c3f2e588 RDI: ffff9451c3f2e588\nRBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000\nR10: ffff9451c3f2e580 R11: 000000000000001f R12: ffff945121fa9000\nR13: ffffbab1e9bcf760 R14: 0000000000000013 R15: ffffffff9e65dd40\nFS:  00007faee5fbe740(0000) GS:ffff94546fd80000(0000) knlGS:0000000000000000\nCS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000000000000020 CR3: 0000000106c2e005 CR4: 00000000001706f0\nCall Trace:\n<TASK>\nice_get_coalesce+0x17/0x30 [ice]\ncoalesce_prepare_data+0x61/0x80\nethnl_default_doit+0xde/0x340\ngenl_family_rcv_msg_doit+0xf2/0x150\ngenl_rcv_msg+0x1b3/0x2c0\nnetlink_rcv_skb+0x5b/0x110\ngenl_rcv+0x28/0x40\nnetlink_unicast+0x19c/0x290\nnetlink_sendmsg+0x222/0x490\n__sys_sendto+0x1df/0x1f0\n__x64_sys_sendto+0x24/0x30\ndo_syscall_64+0x82/0x160\nentry_SYSCALL_64_after_hwframe+0x76/0x7e\nRIP: 0033:0x7faee60d8e27\n\nCalling netif_device_detach() before reset makes the net core not call\nthe driver when ethtool command is issued, the attempt to execute an\nethtool command during reset will result in the following message:\n\n    netlink error: No such device\n\ninstead of NULL pointer dereference. Once reset is done and\nice_rebuild() is executing, the netif_device_attach() is called to allow\nfor ethtool operations to occur again in a safe manner.(CVE-2024-46770)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nsched: sch_cake: fix bulk flow accounting logic for host fairness\n\nIn sch_cake, we keep track of the count of active bulk flows per host,\nwhen running in dst/src host fairness mode, which is used as the\nround-robin weight when iterating through flows. The count of active\nbulk flows is updated whenever a flow changes state.\n\nThis has a peculiar interaction with the hash collision handling: when a\nhash collision occurs (after the set-associative hashing), the state of\nthe hash bucket is simply updated to match the new packet that collided,\nand if host fairness is enabled, that also means assigning new per-host\nstate to the flow. For this reason, the bulk flow counters of the\nhost(s) assigned to the flow are decremented, before new state is\nassigned (and the counters, which may not belong to the same host\nanymore, are incremented again).\n\nBack when this code was introduced, the host fairness mode was always\nenabled, so the decrement was unconditional. When the configuration\nflags were introduced the *increment* was made conditional, but\nthe *decrement* was not. Which of course can lead to a spurious\ndecrement (and associated wrap-around to U16_MAX).\n\nAFAICT, when host fairness is disabled, the decrement and wrap-around\nhappens as soon as a hash collision occurs (which is not that common in\nitself, due to the set-associative hashing). However, in most cases this\nis harmless, as the value is only used when host fairness mode is\nenabled. So in order to trigger an array overflow, sch_cake has to first\nbe configured with host fairness disabled, and while running in this\nmode, a hash collision has to occur to cause the overflow. Then, the\nqdisc has to be reconfigured to enable host fairness, which leads to the\narray out-of-bounds because the wrapped-around value is retained and\nused as an array index. It seems that syzbot managed to trigger this,\nwhich is quite impressive in its own right.\n\nThis patch fixes the issue by introducing the same conditional check on\ndecrement as is used on increment.\n\nThe original bug predates the upstreaming of cake, but the commit listed\nin the Fixes tag touched that code, meaning that this patch won't apply\nbefore that.(CVE-2024-46828)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nperf/x86/intel: Limit the period on Haswell\n\nRunning the ltp test cve-2015-3290 concurrently reports the following\nwarnings.\n\nperfevents: irq loop stuck!\n  WARNING: CPU: 31 PID: 32438 at arch/x86/events/intel/core.c:3174\n  intel_pmu_handle_irq+0x285/0x370\n  Call Trace:\n   <NMI>\n   ? __warn+0xa4/0x220\n   ? intel_pmu_handle_irq+0x285/0x370\n   ? __report_bug+0x123/0x130\n   ? intel_pmu_handle_irq+0x285/0x370\n   ? __report_bug+0x123/0x130\n   ? intel_pmu_handle_irq+0x285/0x370\n   ? report_bug+0x3e/0xa0\n   ? handle_bug+0x3c/0x70\n   ? exc_invalid_op+0x18/0x50\n   ? asm_exc_invalid_op+0x1a/0x20\n   ? irq_work_claim+0x1e/0x40\n   ? intel_pmu_handle_irq+0x285/0x370\n   perf_event_nmi_handler+0x3d/0x60\n   nmi_handle+0x104/0x330\n\nThanks to Thomas Gleixner's analysis, the issue is caused by the low\ninitial period (1) of the frequency estimation algorithm, which triggers\nthe defects of the HW, specifically erratum HSW11 and HSW143. (For the\ndetails, please refer https://lore.kernel.org/lkml/87plq9l5d2.ffs@tglx/)\n\nThe HSW11 requires a period larger than 100 for the INST_RETIRED.ALL\nevent, but the initial period in the freq mode is 1. The erratum is the\nsame as the BDM11, which has been supported in the kernel. A minimum\nperiod of 128 is enforced as well on HSW.\n\nHSW143 is regarding that the fixed counter 1 may overcount 32 with the\nHyper-Threading is enabled. However, based on the test, the hardware\nhas more issues than it tells. Besides the fixed counter 1, the message\n'interrupt took too long' can be observed on any counter which was armed\nwith a period < 32 and two events expired in the same NMI. A minimum\nperiod of 32 is enforced for the rest of the events.\nThe recommended workaround code of the HSW143 is not implemented.\nBecause it only addresses the issue for the fixed counter. It brings\nextra overhead through extra MSR writing. No related overcounting issue\nhas been reported so far.(CVE-2024-46848)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nocfs2: add bounds checking to ocfs2_xattr_find_entry()\n\nAdd a paranoia check to make sure it doesn't stray beyond valid memory\nregion containing ocfs2 xattr entries when scanning for a match.  It will\nprevent out-of-bound access in case of crafted images.(CVE-2024-47670)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nwifi: ath9k_htc: Use __skb_set_length() for resetting urb before resubmit\n\nSyzbot points out that skb_trim() has a sanity check on the existing length of\nthe skb, which can be uninitialised in some error paths. The intent here is\nclearly just to reset the length to zero before resubmitting, so switch to\ncalling __skb_set_length(skb, 0) directly. In addition, __skb_set_length()\nalready contains a call to skb_reset_tail_pointer(), so remove the redundant\ncall.\n\nThe syzbot report came from ath9k_hif_usb_reg_in_cb(), but there's a similar\nusage of skb_trim() in ath9k_hif_usb_rx_cb(), change both while we're at it.(CVE-2024-49938)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nsctp: set sk_state back to CLOSED if autobind fails in sctp_listen_start\n\nIn sctp_listen_start() invoked by sctp_inet_listen(), it should set the\nsk_state back to CLOSED if sctp_autobind() fails due to whatever reason.\n\nOtherwise, next time when calling sctp_inet_listen(), if sctp_sk(sk)->reuse\nis already set via setsockopt(SCTP_REUSE_PORT), sctp_sk(sk)->bind_hash will\nbe dereferenced as sk_state is LISTENING, which causes a crash as bind_hash\nis NULL.\n\n  KASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007]\n  RIP: 0010:sctp_inet_listen+0x7f0/0xa20 net/sctp/socket.c:8617\n  Call Trace:\n   <TASK>\n   __sys_listen_socket net/socket.c:1883 [inline]\n   __sys_listen+0x1b7/0x230 net/socket.c:1894\n   __do_sys_listen net/socket.c:1902 [inline](CVE-2024-49944)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nf_tables: prevent nf_skb_duplicated corruption\n\nsyzbot found that nf_dup_ipv4() or nf_dup_ipv6() could write\nper-cpu variable nf_skb_duplicated in an unsafe way [1].\n\nDisabling preemption as hinted by the splat is not enough,\nwe have to disable soft interrupts as well.\n\n[1]\nBUG: using __this_cpu_write() in preemptible [00000000] code: syz.4.282/6316\n caller is nf_dup_ipv4+0x651/0x8f0 net/ipv4/netfilter/nf_dup_ipv4.c:87\nCPU: 0 UID: 0 PID: 6316 Comm: syz.4.282 Not tainted 6.11.0-rc7-syzkaller-00104-g7052622fccb1 #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024\nCall Trace:\n <TASK>\n  __dump_stack lib/dump_stack.c:93 [inline]\n  dump_stack_lvl+0x241/0x360 lib/dump_stack.c:119\n  check_preemption_disabled+0x10e/0x120 lib/smp_processor_id.c:49\n  nf_dup_ipv4+0x651/0x8f0 net/ipv4/netfilter/nf_dup_ipv4.c:87\n  nft_dup_ipv4_eval+0x1db/0x300 net/ipv4/netfilter/nft_dup_ipv4.c:30\n  expr_call_ops_eval net/netfilter/nf_tables_core.c:240 [inline]\n  nft_do_chain+0x4ad/0x1da0 net/netfilter/nf_tables_core.c:288\n  nft_do_chain_ipv4+0x202/0x320 net/netfilter/nft_chain_filter.c:23\n  nf_hook_entry_hookfn include/linux/netfilter.h:154 [inline]\n  nf_hook_slow+0xc3/0x220 net/netfilter/core.c:626\n  nf_hook+0x2c4/0x450 include/linux/netfilter.h:269\n  NF_HOOK_COND include/linux/netfilter.h:302 [inline]\n  ip_output+0x185/0x230 net/ipv4/ip_output.c:433\n  ip_local_out net/ipv4/ip_output.c:129 [inline]\n  ip_send_skb+0x74/0x100 net/ipv4/ip_output.c:1495\n  udp_send_skb+0xacf/0x1650 net/ipv4/udp.c:981\n  udp_sendmsg+0x1c21/0x2a60 net/ipv4/udp.c:1269\n  sock_sendmsg_nosec net/socket.c:730 [inline]\n  __sock_sendmsg+0x1a6/0x270 net/socket.c:745\n  ____sys_sendmsg+0x525/0x7d0 net/socket.c:2597\n  ___sys_sendmsg net/socket.c:2651 [inline]\n  __sys_sendmmsg+0x3b2/0x740 net/socket.c:2737\n  __do_sys_sendmmsg net/socket.c:2766 [inline]\n  __se_sys_sendmmsg net/socket.c:2763 [inline]\n  __x64_sys_sendmmsg+0xa0/0xb0 net/socket.c:2763\n  do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n  do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\nRIP: 0033:0x7f4ce4f7def9\nCode: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48\nRSP: 002b:00007f4ce5d4a038 EFLAGS: 00000246 ORIG_RAX: 0000000000000133\nRAX: ffffffffffffffda RBX: 00007f4ce5135f80 RCX: 00007f4ce4f7def9\nRDX: 0000000000000001 RSI: 0000000020005d40 RDI: 0000000000000006\nRBP: 00007f4ce4ff0b76 R08: 0000000000000000 R09: 0000000000000000\nR10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000\nR13: 0000000000000000 R14: 00007f4ce5135f80 R15: 00007ffd4cbc6d68\n </TASK>(CVE-2024-49952)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\njbd2: stop waiting for space when jbd2_cleanup_journal_tail() returns error\n\nIn __jbd2_log_wait_for_space(), we might call jbd2_cleanup_journal_tail()\nto recover some journal space. But if an error occurs while executing\njbd2_cleanup_journal_tail() (e.g., an EIO), we don't stop waiting for free\nspace right away, we try other branches, and if j_committing_transaction\nis NULL (i.e., the tid is 0), we will get the following complain:\n\n============================================\nJBD2: I/O error when updating journal superblock for sdd-8.\n__jbd2_log_wait_for_space: needed 256 blocks and only had 217 space available\n__jbd2_log_wait_for_space: no way to get more journal space in sdd-8\n------------[ cut here ]------------\nWARNING: CPU: 2 PID: 139804 at fs/jbd2/checkpoint.c:109 __jbd2_log_wait_for_space+0x251/0x2e0\nModules linked in:\nCPU: 2 PID: 139804 Comm: kworker/u8:3 Not tainted 6.6.0+ #1\nRIP: 0010:__jbd2_log_wait_for_space+0x251/0x2e0\nCall Trace:\n <TASK>\n add_transaction_credits+0x5d1/0x5e0\n start_this_handle+0x1ef/0x6a0\n jbd2__journal_start+0x18b/0x340\n ext4_dirty_inode+0x5d/0xb0\n __mark_inode_dirty+0xe4/0x5d0\n generic_update_time+0x60/0x70\n[...]\n============================================\n\nSo only if jbd2_cleanup_journal_tail() returns 1, i.e., there is nothing to\nclean up at the moment, continue to try to reclaim free space in other ways.\n\nNote that this fix relies on commit 6f6a6fda2945 (\"jbd2: fix ocfs2 corrupt\nwhen updating journal superblock fails\") to make jbd2_cleanup_journal_tail\nreturn the correct error code.(CVE-2024-49959)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nmailbox: bcm2835: Fix timeout during suspend mode\n\nDuring noirq suspend phase the Raspberry Pi power driver suffer of\nfirmware property timeouts. The reason is that the IRQ of the underlying\nBCM2835 mailbox is disabled and rpi_firmware_property_list() will always\nrun into a timeout [1].\n\nSince the VideoCore side isn't consider as a wakeup source, set the\nIRQF_NO_SUSPEND flag for the mailbox IRQ in order to keep it enabled\nduring suspend-resume cycle.\n\n[1]\nPM: late suspend of devices complete after 1.754 msecs\nWARNING: CPU: 0 PID: 438 at drivers/firmware/raspberrypi.c:128\n rpi_firmware_property_list+0x204/0x22c\nFirmware transaction 0x00028001 timeout\nModules linked in:\nCPU: 0 PID: 438 Comm: bash Tainted: G         C         6.9.3-dirty #17\nHardware name: BCM2835\nCall trace:\nunwind_backtrace from show_stack+0x18/0x1c\nshow_stack from dump_stack_lvl+0x34/0x44\ndump_stack_lvl from __warn+0x88/0xec\n__warn from warn_slowpath_fmt+0x7c/0xb0\nwarn_slowpath_fmt from rpi_firmware_property_list+0x204/0x22c\nrpi_firmware_property_list from rpi_firmware_property+0x68/0x8c\nrpi_firmware_property from rpi_firmware_set_power+0x54/0xc0\nrpi_firmware_set_power from _genpd_power_off+0xe4/0x148\n_genpd_power_off from genpd_sync_power_off+0x7c/0x11c\ngenpd_sync_power_off from genpd_finish_suspend+0xcc/0xe0\ngenpd_finish_suspend from dpm_run_callback+0x78/0xd0\ndpm_run_callback from device_suspend_noirq+0xc0/0x238\ndevice_suspend_noirq from dpm_suspend_noirq+0xb0/0x168\ndpm_suspend_noirq from suspend_devices_and_enter+0x1b8/0x5ac\nsuspend_devices_and_enter from pm_suspend+0x254/0x2e4\npm_suspend from state_store+0xa8/0xd4\nstate_store from kernfs_fop_write_iter+0x154/0x1a0\nkernfs_fop_write_iter from vfs_write+0x12c/0x184\nvfs_write from ksys_write+0x78/0xc0\nksys_write from ret_fast_syscall+0x0/0x54\nException stack(0xcc93dfa8 to 0xcc93dff0)\n[...]\nPM: noirq suspend of devices complete after 3095.584 msecs(CVE-2024-49963)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\ntty: n_gsm: Fix use-after-free in gsm_cleanup_mux\n\nBUG: KASAN: slab-use-after-free in gsm_cleanup_mux+0x77b/0x7b0\ndrivers/tty/n_gsm.c:3160 [n_gsm]\nRead of size 8 at addr ffff88815fe99c00 by task poc/3379\nCPU: 0 UID: 0 PID: 3379 Comm: poc Not tainted 6.11.0+ #56\nHardware name: VMware, Inc. VMware Virtual Platform/440BX\nDesktop Reference Platform, BIOS 6.00 11/12/2020\nCall Trace:\n <TASK>\n gsm_cleanup_mux+0x77b/0x7b0 drivers/tty/n_gsm.c:3160 [n_gsm]\n __pfx_gsm_cleanup_mux+0x10/0x10 drivers/tty/n_gsm.c:3124 [n_gsm]\n __pfx_sched_clock_cpu+0x10/0x10 kernel/sched/clock.c:389\n update_load_avg+0x1c1/0x27b0 kernel/sched/fair.c:4500\n __pfx_min_vruntime_cb_rotate+0x10/0x10 kernel/sched/fair.c:846\n __rb_insert_augmented+0x492/0xbf0 lib/rbtree.c:161\n gsmld_ioctl+0x395/0x1450 drivers/tty/n_gsm.c:3408 [n_gsm]\n _raw_spin_lock_irqsave+0x92/0xf0 arch/x86/include/asm/atomic.h:107\n __pfx_gsmld_ioctl+0x10/0x10 drivers/tty/n_gsm.c:3822 [n_gsm]\n ktime_get+0x5e/0x140 kernel/time/timekeeping.c:195\n ldsem_down_read+0x94/0x4e0 arch/x86/include/asm/atomic64_64.h:79\n __pfx_ldsem_down_read+0x10/0x10 drivers/tty/tty_ldsem.c:338\n __pfx_do_vfs_ioctl+0x10/0x10 fs/ioctl.c:805\n tty_ioctl+0x643/0x1100 drivers/tty/tty_io.c:2818\n\nAllocated by task 65:\n gsm_data_alloc.constprop.0+0x27/0x190 drivers/tty/n_gsm.c:926 [n_gsm]\n gsm_send+0x2c/0x580 drivers/tty/n_gsm.c:819 [n_gsm]\n gsm1_receive+0x547/0xad0 drivers/tty/n_gsm.c:3038 [n_gsm]\n gsmld_receive_buf+0x176/0x280 drivers/tty/n_gsm.c:3609 [n_gsm]\n tty_ldisc_receive_buf+0x101/0x1e0 drivers/tty/tty_buffer.c:391\n tty_port_default_receive_buf+0x61/0xa0 drivers/tty/tty_port.c:39\n flush_to_ldisc+0x1b0/0x750 drivers/tty/tty_buffer.c:445\n process_scheduled_works+0x2b0/0x10d0 kernel/workqueue.c:3229\n worker_thread+0x3dc/0x950 kernel/workqueue.c:3391\n kthread+0x2a3/0x370 kernel/kthread.c:389\n ret_from_fork+0x2d/0x70 arch/x86/kernel/process.c:147\n ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:257\n\nFreed by task 3367:\n kfree+0x126/0x420 mm/slub.c:4580\n gsm_cleanup_mux+0x36c/0x7b0 drivers/tty/n_gsm.c:3160 [n_gsm]\n gsmld_ioctl+0x395/0x1450 drivers/tty/n_gsm.c:3408 [n_gsm]\n tty_ioctl+0x643/0x1100 drivers/tty/tty_io.c:2818\n\n[Analysis]\ngsm_msg on the tx_ctrl_list or tx_data_list of gsm_mux\ncan be freed by multi threads through ioctl,which leads\nto the occurrence of uaf. Protect it by gsm tx lock.(CVE-2024-50073)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nLoongArch: Don't crash in stack_top() for tasks without vDSO\n\nNot all tasks have a vDSO mapped, for example kthreads never do. If such\na task ever ends up calling stack_top(), it will derefence the NULL vdso\npointer and crash.\n\nThis can for example happen when using kunit:\n\n\t[<9000000000203874>] stack_top+0x58/0xa8\n\t[<90000000002956cc>] arch_pick_mmap_layout+0x164/0x220\n\t[<90000000003c284c>] kunit_vm_mmap_init+0x108/0x12c\n\t[<90000000003c1fbc>] __kunit_add_resource+0x38/0x8c\n\t[<90000000003c2704>] kunit_vm_mmap+0x88/0xc8\n\t[<9000000000410b14>] usercopy_test_init+0xbc/0x25c\n\t[<90000000003c1db4>] kunit_try_run_case+0x5c/0x184\n\t[<90000000003c3d54>] kunit_generic_run_threadfn_adapter+0x24/0x48\n\t[<900000000022e4bc>] kthread+0xc8/0xd4\n\t[<9000000000200ce8>] ret_from_kernel_thread+0xc/0xa4(CVE-2024-50133)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nxfrm: validate new SA's prefixlen using SA family when sel.family is unset\n\nThis expands the validation introduced in commit 07bf7908950a (\"xfrm:\nValidate address prefix lengths in the xfrm selector.\")\n\nsyzbot created an SA with\n    usersa.sel.family = AF_UNSPEC\n    usersa.sel.prefixlen_s = 128\n    usersa.family = AF_INET\n\nBecause of the AF_UNSPEC selector, verify_newsa_info doesn't put\nlimits on prefixlen_{s,d}. But then copy_from_user_state sets\nx->sel.family to usersa.family (AF_INET). Do the same conversion in\nverify_newsa_info before validating prefixlen_{s,d}, since that's how\nprefixlen is going to be used later on.(CVE-2024-50142)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nbe2net: fix potential memory leak in be_xmit()\n\nThe be_xmit() returns NETDEV_TX_OK without freeing skb\nin case of be_xmit_enqueue() fails, add dev_kfree_skb_any() to fix it.(CVE-2024-50167)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nnet/sun3_82586: fix potential memory leak in sun3_82586_send_packet()\n\nThe sun3_82586_send_packet() returns NETDEV_TX_OK without freeing skb\nin case of skb->len being too long, add dev_kfree_skb() to fix it.(CVE-2024-50168)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nft_payload: sanitize offset and length before calling skb_checksum()\n\nIf access to offset + length is larger than the skbuff length, then\nskb_checksum() triggers BUG_ON().\n\nskb_checksum() internally subtracts the length parameter while iterating\nover skbuff, BUG_ON(len) at the end of it checks that the expected\nlength to be included in the checksum calculation is fully consumed.(CVE-2024-50251)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\ndrm/i915/hdcp: Add encoder check in hdcp2_get_capability\n\nAdd encoder check in intel_hdcp2_get_capability to avoid\nnull pointer error.(CVE-2024-53050)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Check validity of link->type in bpf_link_show_fdinfo()\n\nIf a newly-added link type doesn't invoke BPF_LINK_TYPE(), accessing\nbpf_link_type_strs[link->type] may result in an out-of-bounds access.\n\nTo spot such missed invocations early in the future, checking the\nvalidity of link->type in bpf_link_show_fdinfo() and emitting a warning\nwhen such invocations are missed.(CVE-2024-53099)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nfs: Fix uninitialized value issue in from_kuid and from_kgid\n\nocfs2_setattr() uses attr->ia_mode, attr->ia_uid and attr->ia_gid in\na trace point even though ATTR_MODE, ATTR_UID and ATTR_GID aren't set.\n\nInitialize all fields of newattrs to avoid uninitialized variables, by\nchecking if ATTR_MODE, ATTR_UID, ATTR_GID are initialized, otherwise 0.(CVE-2024-53101)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nsched/task_stack: fix object_is_on_stack() for KASAN tagged pointers\n\nWhen CONFIG_KASAN_SW_TAGS and CONFIG_KASAN_STACK are enabled, the\nobject_is_on_stack() function may produce incorrect results due to the\npresence of tags in the obj pointer, while the stack pointer does not have\ntags.  This discrepancy can lead to incorrect stack object detection and\nsubsequently trigger warnings if CONFIG_DEBUG_OBJECTS is also enabled.\n\nExample of the warning:\n\nODEBUG: object 3eff800082ea7bb0 is NOT on stack ffff800082ea0000, but annotated.\n------------[ cut here ]------------\nWARNING: CPU: 0 PID: 1 at lib/debugobjects.c:557 __debug_object_init+0x330/0x364\nModules linked in:\nCPU: 0 UID: 0 PID: 1 Comm: swapper/0 Not tainted 6.12.0-rc5 #4\nHardware name: linux,dummy-virt (DT)\npstate: 600000c5 (nZCv daIF -PAN -UAO -TCO -DIT -SSBS BTYPE=--)\npc : __debug_object_init+0x330/0x364\nlr : __debug_object_init+0x330/0x364\nsp : ffff800082ea7b40\nx29: ffff800082ea7b40 x28: 98ff0000c0164518 x27: 98ff0000c0164534\nx26: ffff800082d93ec8 x25: 0000000000000001 x24: 1cff0000c00172a0\nx23: 0000000000000000 x22: ffff800082d93ed0 x21: ffff800081a24418\nx20: 3eff800082ea7bb0 x19: efff800000000000 x18: 0000000000000000\nx17: 00000000000000ff x16: 0000000000000047 x15: 206b63617473206e\nx14: 0000000000000018 x13: ffff800082ea7780 x12: 0ffff800082ea78e\nx11: 0ffff800082ea790 x10: 0ffff800082ea79d x9 : 34d77febe173e800\nx8 : 34d77febe173e800 x7 : 0000000000000001 x6 : 0000000000000001\nx5 : feff800082ea74b8 x4 : ffff800082870a90 x3 : ffff80008018d3c4\nx2 : 0000000000000001 x1 : ffff800082858810 x0 : 0000000000000050\nCall trace:\n __debug_object_init+0x330/0x364\n debug_object_init_on_stack+0x30/0x3c\n schedule_hrtimeout_range_clock+0xac/0x26c\n schedule_hrtimeout+0x1c/0x30\n wait_task_inactive+0x1d4/0x25c\n kthread_bind_mask+0x28/0x98\n init_rescuer+0x1e8/0x280\n workqueue_init+0x1a0/0x3cc\n kernel_init_freeable+0x118/0x200\n kernel_init+0x28/0x1f0\n ret_from_fork+0x10/0x20\n---[ end trace 0000000000000000 ]---\nODEBUG: object 3eff800082ea7bb0 is NOT on stack ffff800082ea0000, but annotated.\n------------[ cut here ]------------(CVE-2024-53128)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nALSA: usb-audio: Fix out of bounds reads when finding clock sources\n\nThe current USB-audio driver code doesn't check bLength of each\ndescriptor at traversing for clock descriptors.  That is, when a\ndevice provides a bogus descriptor with a shorter bLength, the driver\nmight hit out-of-bounds reads.\n\nFor addressing it, this patch adds sanity checks to the validator\nfunctions for the clock descriptor traversal.  When the descriptor\nlength is shorter than expected, it's skipped in the loop.\n\nFor the clock source and clock multiplier descriptors, we can just\ncheck bLength against the sizeof() of each descriptor type.\nOTOH, the clock selector descriptor of UAC2 and UAC3 has an array\nof bNrInPins elements and two more fields at its tail, hence those\nhave to be checked in addition to the sizeof() check.(CVE-2024-53150)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nocfs2: fix uninitialized value in ocfs2_file_read_iter()\n\nSyzbot has reported the following KMSAN splat:\n\nBUG: KMSAN: uninit-value in ocfs2_file_read_iter+0x9a4/0xf80\n ocfs2_file_read_iter+0x9a4/0xf80\n __io_read+0x8d4/0x20f0\n io_read+0x3e/0xf0\n io_issue_sqe+0x42b/0x22c0\n io_wq_submit_work+0xaf9/0xdc0\n io_worker_handle_work+0xd13/0x2110\n io_wq_worker+0x447/0x1410\n ret_from_fork+0x6f/0x90\n ret_from_fork_asm+0x1a/0x30\n\nUninit was created at:\n __alloc_pages_noprof+0x9a7/0xe00\n alloc_pages_mpol_noprof+0x299/0x990\n alloc_pages_noprof+0x1bf/0x1e0\n allocate_slab+0x33a/0x1250\n ___slab_alloc+0x12ef/0x35e0\n kmem_cache_alloc_bulk_noprof+0x486/0x1330\n __io_alloc_req_refill+0x84/0x560\n io_submit_sqes+0x172f/0x2f30\n __se_sys_io_uring_enter+0x406/0x41c0\n __x64_sys_io_uring_enter+0x11f/0x1a0\n x64_sys_call+0x2b54/0x3ba0\n do_syscall_64+0xcd/0x1e0\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n\nSince an instance of 'struct kiocb' may be passed from the block layer\nwith 'private' field uninitialized, introduce 'ocfs2_iocb_init_rw_locked()'\nand use it from where 'ocfs2_dio_end_io()' might take care, i.e. in\n'ocfs2_file_read_iter()' and 'ocfs2_file_write_iter()'.(CVE-2024-53155)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nfirmware: arm_scpi: Check the DVFS OPP count returned by the firmware\n\nFix a kernel crash with the below call trace when the SCPI firmware\nreturns OPP count of zero.\n\ndvfs_info.opp_count may be zero on some platforms during the reboot\ntest, and the kernel will crash after dereferencing the pointer to\nkcalloc(info->count, sizeof(*opp), GFP_KERNEL).\n\n  |  Unable to handle kernel NULL pointer dereference at virtual address 0000000000000028\n  |  Mem abort info:\n  |    ESR = 0x96000004\n  |    Exception class = DABT (current EL), IL = 32 bits\n  |    SET = 0, FnV = 0\n  |    EA = 0, S1PTW = 0\n  |  Data abort info:\n  |    ISV = 0, ISS = 0x00000004\n  |    CM = 0, WnR = 0\n  |  user pgtable: 4k pages, 48-bit VAs, pgdp = 00000000faefa08c\n  |  [0000000000000028] pgd=0000000000000000\n  |  Internal error: Oops: 96000004 [#1] SMP\n  |  scpi-hwmon: probe of PHYT000D:00 failed with error -110\n  |  Process systemd-udevd (pid: 1701, stack limit = 0x00000000aaede86c)\n  |  CPU: 2 PID: 1701 Comm: systemd-udevd Not tainted 4.19.90+ #1\n  |  Hardware name: PHYTIUM LTD Phytium FT2000/4/Phytium FT2000/4, BIOS\n  |  pstate: 60000005 (nZCv daif -PAN -UAO)\n  |  pc : scpi_dvfs_recalc_rate+0x40/0x58 [clk_scpi]\n  |  lr : clk_register+0x438/0x720\n  |  Call trace:\n  |   scpi_dvfs_recalc_rate+0x40/0x58 [clk_scpi]\n  |   devm_clk_hw_register+0x50/0xa0\n  |   scpi_clk_ops_init.isra.2+0xa0/0x138 [clk_scpi]\n  |   scpi_clocks_probe+0x528/0x70c [clk_scpi]\n  |   platform_drv_probe+0x58/0xa8\n  |   really_probe+0x260/0x3d0\n  |   driver_probe_device+0x12c/0x148\n  |   device_driver_attach+0x74/0x98\n  |   __driver_attach+0xb4/0xe8\n  |   bus_for_each_dev+0x88/0xe0\n  |   driver_attach+0x30/0x40\n  |   bus_add_driver+0x178/0x2b0\n  |   driver_register+0x64/0x118\n  |   __platform_driver_register+0x54/0x60\n  |   scpi_clocks_driver_init+0x24/0x1000 [clk_scpi]\n  |   do_one_initcall+0x54/0x220\n  |   do_init_module+0x54/0x1c8\n  |   load_module+0x14a4/0x1668\n  |   __se_sys_finit_module+0xf8/0x110\n  |   __arm64_sys_finit_module+0x24/0x30\n  |   el0_svc_common+0x78/0x170\n  |   el0_svc_handler+0x38/0x78\n  |   el0_svc+0x8/0x340\n  |  Code: 937d7c00 a94153f3 a8c27bfd f9400421 (b8606820)\n  |  ---[ end trace 06feb22469d89fa8 ]---\n  |  Kernel panic - not syncing: Fatal exception\n  |  SMP: stopping secondary CPUs\n  |  Kernel Offset: disabled\n  |  CPU features: 0x10,a0002008\n  |  Memory Limit: none(CVE-2024-53157)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nsoc: qcom: geni-se: fix array underflow in geni_se_clk_tbl_get()\n\nThis loop is supposed to break if the frequency returned from\nclk_round_rate() is the same as on the previous iteration.  However,\nthat check doesn't make sense on the first iteration through the loop.\nIt leads to reading before the start of these->clk_perf_tbl[] array.(CVE-2024-53158)\n\nRejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.(CVE-2024-53159)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nrcu/kvfree: Fix data-race in __mod_timer / kvfree_call_rcu\n\nKCSAN reports a data race when access the krcp->monitor_work.timer.expires\nvariable in the schedule_delayed_monitor_work() function:\n\n<snip>\nBUG: KCSAN: data-race in __mod_timer / kvfree_call_rcu\n\nread to 0xffff888237d1cce8 of 8 bytes by task 10149 on cpu 1:\n schedule_delayed_monitor_work kernel/rcu/tree.c:3520 [inline]\n kvfree_call_rcu+0x3b8/0x510 kernel/rcu/tree.c:3839\n trie_update_elem+0x47c/0x620 kernel/bpf/lpm_trie.c:441\n bpf_map_update_value+0x324/0x350 kernel/bpf/syscall.c:203\n generic_map_update_batch+0x401/0x520 kernel/bpf/syscall.c:1849\n bpf_map_do_batch+0x28c/0x3f0 kernel/bpf/syscall.c:5143\n __sys_bpf+0x2e5/0x7a0\n __do_sys_bpf kernel/bpf/syscall.c:5741 [inline]\n __se_sys_bpf kernel/bpf/syscall.c:5739 [inline]\n __x64_sys_bpf+0x43/0x50 kernel/bpf/syscall.c:5739\n x64_sys_call+0x2625/0x2d60 arch/x86/include/generated/asm/syscalls_64.h:322\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0xc9/0x1c0 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n\nwrite to 0xffff888237d1cce8 of 8 bytes by task 56 on cpu 0:\n __mod_timer+0x578/0x7f0 kernel/time/timer.c:1173\n add_timer_global+0x51/0x70 kernel/time/timer.c:1330\n __queue_delayed_work+0x127/0x1a0 kernel/workqueue.c:2523\n queue_delayed_work_on+0xdf/0x190 kernel/workqueue.c:2552\n queue_delayed_work include/linux/workqueue.h:677 [inline]\n schedule_delayed_monitor_work kernel/rcu/tree.c:3525 [inline]\n kfree_rcu_monitor+0x5e8/0x660 kernel/rcu/tree.c:3643\n process_one_work kernel/workqueue.c:3229 [inline]\n process_scheduled_works+0x483/0x9a0 kernel/workqueue.c:3310\n worker_thread+0x51d/0x6f0 kernel/workqueue.c:3391\n kthread+0x1d1/0x210 kernel/kthread.c:389\n ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:147\n ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244\n\nReported by Kernel Concurrency Sanitizer on:\nCPU: 0 UID: 0 PID: 56 Comm: kworker/u8:4 Not tainted 6.12.0-rc2-syzkaller-00050-g5b7c893ed5ed #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024\nWorkqueue: events_unbound kfree_rcu_monitor\n<snip>\n\nkfree_rcu_monitor() rearms the work if a \"krcp\" has to be still\noffloaded and this is done without holding krcp->lock, whereas\nthe kvfree_call_rcu() holds it.\n\nFix it by acquiring the \"krcp->lock\" for kfree_rcu_monitor() so\nboth functions do not race anymore.(CVE-2024-53160)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nubifs: authentication: Fix use-after-free in ubifs_tnc_end_commit\n\nAfter an insertion in TNC, the tree might split and cause a node to\nchange its `znode->parent`. A further deletion of other nodes in the\ntree (which also could free the nodes), the aforementioned node's\n`znode->cparent` could still point to a freed node. This\n`znode->cparent` may not be updated when getting nodes to commit in\n`ubifs_tnc_start_commit()`. This could then trigger a use-after-free\nwhen accessing the `znode->cparent` in `write_index()` in\n`ubifs_tnc_end_commit()`.\n\nThis can be triggered by running\n\n  rm -f /etc/test-file.bin\n  dd if=/dev/urandom of=/etc/test-file.bin bs=1M count=60 conv=fsync\n\nin a loop, and with `CONFIG_UBIFS_FS_AUTHENTICATION`. KASAN then\nreports:\n\n  BUG: KASAN: use-after-free in ubifs_tnc_end_commit+0xa5c/0x1950\n  Write of size 32 at addr ffffff800a3af86c by task ubifs_bgt0_20/153\n\n  Call trace:\n   dump_backtrace+0x0/0x340\n   show_stack+0x18/0x24\n   dump_stack_lvl+0x9c/0xbc\n   print_address_description.constprop.0+0x74/0x2b0\n   kasan_report+0x1d8/0x1f0\n   kasan_check_range+0xf8/0x1a0\n   memcpy+0x84/0xf4\n   ubifs_tnc_end_commit+0xa5c/0x1950\n   do_commit+0x4e0/0x1340\n   ubifs_bg_thread+0x234/0x2e0\n   kthread+0x36c/0x410\n   ret_from_fork+0x10/0x20\n\n  Allocated by task 401:\n   kasan_save_stack+0x38/0x70\n   __kasan_kmalloc+0x8c/0xd0\n   __kmalloc+0x34c/0x5bc\n   tnc_insert+0x140/0x16a4\n   ubifs_tnc_add+0x370/0x52c\n   ubifs_jnl_write_data+0x5d8/0x870\n   do_writepage+0x36c/0x510\n   ubifs_writepage+0x190/0x4dc\n   __writepage+0x58/0x154\n   write_cache_pages+0x394/0x830\n   do_writepages+0x1f0/0x5b0\n   filemap_fdatawrite_wbc+0x170/0x25c\n   file_write_and_wait_range+0x140/0x190\n   ubifs_fsync+0xe8/0x290\n   vfs_fsync_range+0xc0/0x1e4\n   do_fsync+0x40/0x90\n   __arm64_sys_fsync+0x34/0x50\n   invoke_syscall.constprop.0+0xa8/0x260\n   do_el0_svc+0xc8/0x1f0\n   el0_svc+0x34/0x70\n   el0t_64_sync_handler+0x108/0x114\n   el0t_64_sync+0x1a4/0x1a8\n\n  Freed by task 403:\n   kasan_save_stack+0x38/0x70\n   kasan_set_track+0x28/0x40\n   kasan_set_free_info+0x28/0x4c\n   __kasan_slab_free+0xd4/0x13c\n   kfree+0xc4/0x3a0\n   tnc_delete+0x3f4/0xe40\n   ubifs_tnc_remove_range+0x368/0x73c\n   ubifs_tnc_remove_ino+0x29c/0x2e0\n   ubifs_jnl_delete_inode+0x150/0x260\n   ubifs_evict_inode+0x1d4/0x2e4\n   evict+0x1c8/0x450\n   iput+0x2a0/0x3c4\n   do_unlinkat+0x2cc/0x490\n   __arm64_sys_unlinkat+0x90/0x100\n   invoke_syscall.constprop.0+0xa8/0x260\n   do_el0_svc+0xc8/0x1f0\n   el0_svc+0x34/0x70\n   el0t_64_sync_handler+0x108/0x114\n   el0t_64_sync+0x1a4/0x1a8\n\nThe offending `memcpy()` in `ubifs_copy_hash()` has a use-after-free\nwhen a node becomes root in TNC but still has a `cparent` to an already\nfreed node. More specifically, consider the following TNC:\n\n         zroot\n         /\n        /\n      zp1\n      /\n     /\n    zn\n\nInserting a new node `zn_new` with a key smaller then `zn` will trigger\na split in `tnc_insert()` if `zp1` is full:\n\n         zroot\n         /   \\\n        /     \\\n      zp1     zp2\n      /         \\\n     /           \\\n  zn_new          zn\n\n`zn->parent` has now been moved to `zp2`, *but* `zn->cparent` still\npoints to `zp1`.\n\nNow, consider a removal of all the nodes _except_ `zn`. Just when\n`tnc_delete()` is about to delete `zroot` and `zp2`:\n\n         zroot\n             \\\n              \\\n              zp2\n                \\\n                 \\\n                 zn\n\n`zroot` and `zp2` get freed and the tree collapses:\n\n           zn\n\n`zn` now becomes the new `zroot`.\n\n`get_znodes_to_commit()` will now only find `zn`, the new `zroot`, and\n`write_index()` will check its `znode->cparent` that wrongly points to\nthe already freed `zp1`. `ubifs_copy_hash()` thus gets wrongly called\nwith `znode->cparent->zbranch[znode->iip].hash` that triggers the\nuse-after-free!\n\nFix this by explicitly setting `znode->cparent` to `NULL` in\n`get_znodes_to_commit()` for the root node. The search for the dirty\nnodes\n---truncated---(CVE-2024-53171)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nALSA: pcm: Add sanity NULL check for the default mmap fault handler\n\nA driver might allow the mmap access before initializing its\nruntime->dma_area properly.  Add a proper NULL check before passing to\nvirt_to_page() for avoiding a panic.(CVE-2024-53180)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nio_uring: check for overflows in io_pin_pages\n\nWARNING: CPU: 0 PID: 5834 at io_uring/memmap.c:144 io_pin_pages+0x149/0x180 io_uring/memmap.c:144\nCPU: 0 UID: 0 PID: 5834 Comm: syz-executor825 Not tainted 6.12.0-next-20241118-syzkaller #0\nCall Trace:\n <TASK>\n __io_uaddr_map+0xfb/0x2d0 io_uring/memmap.c:183\n io_rings_map io_uring/io_uring.c:2611 [inline]\n io_allocate_scq_urings+0x1c0/0x650 io_uring/io_uring.c:3470\n io_uring_create+0x5b5/0xc00 io_uring/io_uring.c:3692\n io_uring_setup io_uring/io_uring.c:3781 [inline]\n ...\n </TASK>\n\nio_pin_pages()'s uaddr parameter came directly from the user and can be\ngarbage. Don't just add size to it as it can overflow.(CVE-2024-53187)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nwifi: rtlwifi: Drastically reduce the attempts to read efuse in case of failures\n\nSyzkaller reported a hung task with uevent_show() on stack trace. That\nspecific issue was addressed by another commit [0], but even with that\nfix applied (for example, running v6.12-rc5) we face another type of hung\ntask that comes from the same reproducer [1]. By investigating that, we\ncould narrow it to the following path:\n\n(a) Syzkaller emulates a Realtek USB WiFi adapter using raw-gadget and\ndummy_hcd infrastructure.\n\n(b) During the probe of rtl8192cu, the driver ends-up performing an efuse\nread procedure (which is related to EEPROM load IIUC), and here lies the\nissue: the function read_efuse() calls read_efuse_byte() many times, as\nloop iterations depending on the efuse size (in our example, 512 in total).\n\nThis procedure for reading efuse bytes relies in a loop that performs an\nI/O read up to *10k* times in case of failures. We measured the time of\nthe loop inside read_efuse_byte() alone, and in this reproducer (which\ninvolves the dummy_hcd emulation layer), it takes 15 seconds each. As a\nconsequence, we have the driver stuck in its probe routine for big time,\nexposing a stack trace like below if we attempt to reboot the system, for\nexample:\n\ntask:kworker/0:3 state:D stack:0 pid:662 tgid:662 ppid:2 flags:0x00004000\nWorkqueue: usb_hub_wq hub_event\nCall Trace:\n __schedule+0xe22/0xeb6\n schedule_timeout+0xe7/0x132\n __wait_for_common+0xb5/0x12e\n usb_start_wait_urb+0xc5/0x1ef\n ? usb_alloc_urb+0x95/0xa4\n usb_control_msg+0xff/0x184\n _usbctrl_vendorreq_sync+0xa0/0x161\n _usb_read_sync+0xb3/0xc5\n read_efuse_byte+0x13c/0x146\n read_efuse+0x351/0x5f0\n efuse_read_all_map+0x42/0x52\n rtl_efuse_shadow_map_update+0x60/0xef\n rtl_get_hwinfo+0x5d/0x1c2\n rtl92cu_read_eeprom_info+0x10a/0x8d5\n ? rtl92c_read_chip_version+0x14f/0x17e\n rtl_usb_probe+0x323/0x851\n usb_probe_interface+0x278/0x34b\n really_probe+0x202/0x4a4\n __driver_probe_device+0x166/0x1b2\n driver_probe_device+0x2f/0xd8\n [...]\n\nWe propose hereby to drastically reduce the attempts of doing the I/O\nreads in case of failures, restricted to USB devices (given that\nthey're inherently slower than PCIe ones). By retrying up to 10 times\n(instead of 10000), we got reponsiveness in the reproducer, while seems\nreasonable to believe that there's no sane USB device implementation in\nthe field requiring this amount of retries at every I/O read in order\nto properly work. Based on that assumption, it'd be good to have it\nbackported to stable but maybe not since driver implementation (the 10k\nnumber comes from day 0), perhaps up to 6.x series makes sense.\n\n[0] Commit 15fffc6a5624 (\"driver core: Fix uevent_show() vs driver detach race\")\n\n[1] A note about that: this syzkaller report presents multiple reproducers\nthat differs by the type of emulated USB device. For this specific case,\ncheck the entry from 2024/08/08 06:23 in the list of crashes; the C repro\nis available at https://syzkaller.appspot.com/text?tag=ReproC&x=1521fc83980000.(CVE-2024-53190)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nwifi: ath12k: fix warning when unbinding\n\nIf there is an error during some initialization related to firmware,\nthe buffers dp->tx_ring[i].tx_status are released.\nHowever this is released again when the device is unbinded (ath12k_pci),\nand we get:\nWARNING: CPU: 0 PID: 2098 at mm/slub.c:4689 free_large_kmalloc+0x4d/0x80\nCall Trace:\nfree_large_kmalloc\nath12k_dp_free\nath12k_core_deinit\nath12k_pci_remove\n...\n\nThe issue is always reproducible from a VM because the MSI addressing\ninitialization is failing.\n\nIn order to fix the issue, just set the buffers to NULL after releasing in\norder to avoid the double free.(CVE-2024-53191)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nPCI: Fix use-after-free of slot->bus on hot remove\n\nDennis reports a boot crash on recent Lenovo laptops with a USB4 dock.\n\nSince commit 0fc70886569c (\"thunderbolt: Reset USB4 v2 host router\") and\ncommit 59a54c5f3dbd (\"thunderbolt: Reset topology created by the boot\nfirmware\"), USB4 v2 and v1 Host Routers are reset on probe of the\nthunderbolt driver.\n\nThe reset clears the Presence Detect State and Data Link Layer Link Active\nbits at the USB4 Host Router's Root Port and thus causes hot removal of the\ndock.\n\nThe crash occurs when pciehp is unbound from one of the dock's Downstream\nPorts:  pciehp creates a pci_slot on bind and destroys it on unbind.  The\npci_slot contains a pointer to the pci_bus below the Downstream Port, but\na reference on that pci_bus is never acquired.  The pci_bus is destroyed\nbefore the pci_slot, so a use-after-free ensues when pci_slot_release()\naccesses slot->bus.\n\nIn principle this should not happen because pci_stop_bus_device() unbinds\npciehp (and therefore destroys the pci_slot) before the pci_bus is\ndestroyed by pci_remove_bus_device().\n\nHowever the stacktrace provided by Dennis shows that pciehp is unbound from\npci_remove_bus_device() instead of pci_stop_bus_device().  To understand\nthe significance of this, one needs to know that the PCI core uses a two\nstep process to remove a portion of the hierarchy:  It first unbinds all\ndrivers in the sub-hierarchy in pci_stop_bus_device() and then actually\nremoves the devices in pci_remove_bus_device().  There is no precaution to\nprevent driver binding in-between pci_stop_bus_device() and\npci_remove_bus_device().\n\nIn Dennis' case, it seems removal of the hierarchy by pciehp races with\ndriver binding by pci_bus_add_devices().  pciehp is bound to the\nDownstream Port after pci_stop_bus_device() has run, so it is unbound by\npci_remove_bus_device() instead of pci_stop_bus_device().  Because the\npci_bus has already been destroyed at that point, accesses to it result in\na use-after-free.\n\nOne might conclude that driver binding needs to be prevented after\npci_stop_bus_device() has run.  However it seems risky that pci_slot points\nto pci_bus without holding a reference.  Solely relying on correct ordering\nof driver unbind versus pci_bus destruction is certainly not defensive\nprogramming.\n\nIf pci_slot has a need to access data in pci_bus, it ought to acquire a\nreference.  Amend pci_create_slot() accordingly.  Dennis reports that the\ncrash is not reproducible with this change.\n\nAbridged stacktrace:\n\n  pcieport 0000:00:07.0: PME: Signaling with IRQ 156\n  pcieport 0000:00:07.0: pciehp: Slot #12 AttnBtn- PwrCtrl- MRL- AttnInd- PwrInd- HotPlug+ Surprise+ Interlock- NoCompl+ IbPresDis- LLActRep+\n  pci_bus 0000:20: dev 00, created physical slot 12\n  pcieport 0000:00:07.0: pciehp: Slot(12): Card not present\n  ...\n  pcieport 0000:21:02.0: pciehp: pcie_disable_notification: SLOTCTRL d8 write cmd 0\n  Oops: general protection fault, probably for non-canonical address 0x6b6b6b6b6b6b6b6b: 0000 [#1] PREEMPT SMP NOPTI\n  CPU: 13 UID: 0 PID: 134 Comm: irq/156-pciehp Not tainted 6.11.0-devel+ #1\n  RIP: 0010:dev_driver_string+0x12/0x40\n  pci_destroy_slot\n  pciehp_remove\n  pcie_port_remove_service\n  device_release_driver_internal\n  bus_remove_device\n  device_del\n  device_unregister\n  remove_iter\n  device_for_each_child\n  pcie_portdrv_remove\n  pci_device_remove\n  device_release_driver_internal\n  bus_remove_device\n  device_del\n  pci_remove_bus_device (recursive invocation)\n  pci_remove_bus_device\n  pciehp_unconfigure_device\n  pciehp_disable_slot\n  pciehp_handle_presence_or_link_change\n  pciehp_ist(CVE-2024-53194)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nKVM: arm64: Don't retire aborted MMIO instruction\n\nReturning an abort to the guest for an unsupported MMIO access is a\ndocumented feature of the KVM UAPI. Nevertheless, it's clear that this\nplumbing has seen limited testing, since userspace can trivially cause a\nWARN in the MMIO return:\n\n  WARNING: CPU: 0 PID: 30558 at arch/arm64/include/asm/kvm_emulate.h:536 kvm_handle_mmio_return+0x46c/0x5c4 arch/arm64/include/asm/kvm_emulate.h:536\n  Call trace:\n   kvm_handle_mmio_return+0x46c/0x5c4 arch/arm64/include/asm/kvm_emulate.h:536\n   kvm_arch_vcpu_ioctl_run+0x98/0x15b4 arch/arm64/kvm/arm.c:1133\n   kvm_vcpu_ioctl+0x75c/0xa78 virt/kvm/kvm_main.c:4487\n   __do_sys_ioctl fs/ioctl.c:51 [inline]\n   __se_sys_ioctl fs/ioctl.c:893 [inline]\n   __arm64_sys_ioctl+0x14c/0x1c8 fs/ioctl.c:893\n   __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline]\n   invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:49\n   el0_svc_common+0x1e0/0x23c arch/arm64/kernel/syscall.c:132\n   do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:151\n   el0_svc+0x38/0x68 arch/arm64/kernel/entry-common.c:712\n   el0t_64_sync_handler+0x90/0xfc arch/arm64/kernel/entry-common.c:730\n   el0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:598\n\nThe splat is complaining that KVM is advancing PC while an exception is\npending, i.e. that KVM is retiring the MMIO instruction despite a\npending synchronous external abort. Womp womp.\n\nFix the glaring UAPI bug by skipping over all the MMIO emulation in\ncase there is a pending synchronous exception. Note that while userspace\nis capable of pending an asynchronous exception (SError, IRQ, or FIQ),\nit is still safe to retire the MMIO instruction in this case as (1) they\nare by definition asynchronous, and (2) KVM relies on hardware support\nfor pending/delivering these exceptions instead of the software state\nmachine for advancing PC.(CVE-2024-53196)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nusb: typec: fix potential array underflow in ucsi_ccg_sync_control()\n\nThe \"command\" variable can be controlled by the user via debugfs.  The\nworry is that if con_index is zero then \"&uc->ucsi->connector[con_index\n- 1]\" would be an array underflow.(CVE-2024-53203)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nnet: usb: lan78xx: Fix double free issue with interrupt buffer allocation\n\nIn lan78xx_probe(), the buffer `buf` was being freed twice: once\nimplicitly through `usb_free_urb(dev->urb_intr)` with the\n`URB_FREE_BUFFER` flag and again explicitly by `kfree(buf)`. This caused\na double free issue.\n\nTo resolve this, reordered `kmalloc()` and `usb_alloc_urb()` calls to\nsimplify the initialization sequence and removed the redundant\n`kfree(buf)`.  Now, `buf` is allocated after `usb_alloc_urb()`, ensuring\nit is correctly managed by  `usb_fill_int_urb()` and freed by\n`usb_free_urb()` as intended.(CVE-2024-53213)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nsvcrdma: fix miss destroy percpu_counter in svc_rdma_proc_init()\n\nThere's issue as follows:\nRPC: Registered rdma transport module.\nRPC: Registered rdma backchannel transport module.\nRPC: Unregistered rdma transport module.\nRPC: Unregistered rdma backchannel transport module.\nBUG: unable to handle page fault for address: fffffbfff80c609a\nPGD 123fee067 P4D 123fee067 PUD 123fea067 PMD 10c624067 PTE 0\nOops: Oops: 0000 [#1] PREEMPT SMP KASAN NOPTI\nRIP: 0010:percpu_counter_destroy_many+0xf7/0x2a0\nCall Trace:\n <TASK>\n __die+0x1f/0x70\n page_fault_oops+0x2cd/0x860\n spurious_kernel_fault+0x36/0x450\n do_kern_addr_fault+0xca/0x100\n exc_page_fault+0x128/0x150\n asm_exc_page_fault+0x26/0x30\n percpu_counter_destroy_many+0xf7/0x2a0\n mmdrop+0x209/0x350\n finish_task_switch.isra.0+0x481/0x840\n schedule_tail+0xe/0xd0\n ret_from_fork+0x23/0x80\n ret_from_fork_asm+0x1a/0x30\n </TASK>\n\nIf register_sysctl() return NULL, then svc_rdma_proc_cleanup() will not\ndestroy the percpu counters which init in svc_rdma_proc_init().\nIf CONFIG_HOTPLUG_CPU is enabled, residual nodes may be in the\n'percpu_counters' list. The above issue may occur once the module is\nremoved. If the CONFIG_HOTPLUG_CPU configuration is not enabled, memory\nleakage occurs.\nTo solve above issue just destroy all percpu counters when\nregister_sysctl() return NULL.(CVE-2024-53215)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nf2fs: fix race in concurrent f2fs_stop_gc_thread\n\nIn my test case, concurrent calls to f2fs shutdown report the following\nstack trace:\n\n Oops: general protection fault, probably for non-canonical address 0xc6cfff63bb5513fc: 0000 [#1] PREEMPT SMP PTI\n CPU: 0 UID: 0 PID: 678 Comm: f2fs_rep_shutdo Not tainted 6.12.0-rc5-next-20241029-g6fb2fa9805c5-dirty #85\n Call Trace:\n  <TASK>\n  ? show_regs+0x8b/0xa0\n  ? __die_body+0x26/0xa0\n  ? die_addr+0x54/0x90\n  ? exc_general_protection+0x24b/0x5c0\n  ? asm_exc_general_protection+0x26/0x30\n  ? kthread_stop+0x46/0x390\n  f2fs_stop_gc_thread+0x6c/0x110\n  f2fs_do_shutdown+0x309/0x3a0\n  f2fs_ioc_shutdown+0x150/0x1c0\n  __f2fs_ioctl+0xffd/0x2ac0\n  f2fs_ioctl+0x76/0xe0\n  vfs_ioctl+0x23/0x60\n  __x64_sys_ioctl+0xce/0xf0\n  x64_sys_call+0x2b1b/0x4540\n  do_syscall_64+0xa7/0x240\n  entry_SYSCALL_64_after_hwframe+0x76/0x7e\n\nThe root cause is a race condition in f2fs_stop_gc_thread() called from\ndifferent f2fs shutdown paths:\n\n  [CPU0]                       [CPU1]\n  ----------------------       -----------------------\n  f2fs_stop_gc_thread          f2fs_stop_gc_thread\n                                 gc_th = sbi->gc_thread\n    gc_th = sbi->gc_thread\n    kfree(gc_th)\n    sbi->gc_thread = NULL\n                                 < gc_th != NULL >\n                                 kthread_stop(gc_th->f2fs_gc_task) //UAF\n\nThe commit c7f114d864ac (\"f2fs: fix to avoid use-after-free in\nf2fs_stop_gc_thread()\") attempted to fix this issue by using a read\nsemaphore to prevent races between shutdown and remount threads, but\nit fails to prevent all race conditions.\n\nFix it by converting to write lock of s_umount in f2fs_do_shutdown().(CVE-2024-53218)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nvirtiofs: use pages instead of pointer for kernel direct IO\n\nWhen trying to insert a 10MB kernel module kept in a virtio-fs with cache\ndisabled, the following warning was reported:\n\n  ------------[ cut here ]------------\n  WARNING: CPU: 1 PID: 404 at mm/page_alloc.c:4551 ......\n  Modules linked in:\n  CPU: 1 PID: 404 Comm: insmod Not tainted 6.9.0-rc5+ #123\n  Hardware name: QEMU Standard PC (i440FX + PIIX, 1996) ......\n  RIP: 0010:__alloc_pages+0x2bf/0x380\n  ......\n  Call Trace:\n   <TASK>\n   ? __warn+0x8e/0x150\n   ? __alloc_pages+0x2bf/0x380\n   __kmalloc_large_node+0x86/0x160\n   __kmalloc+0x33c/0x480\n   virtio_fs_enqueue_req+0x240/0x6d0\n   virtio_fs_wake_pending_and_unlock+0x7f/0x190\n   queue_request_and_unlock+0x55/0x60\n   fuse_simple_request+0x152/0x2b0\n   fuse_direct_io+0x5d2/0x8c0\n   fuse_file_read_iter+0x121/0x160\n   __kernel_read+0x151/0x2d0\n   kernel_read+0x45/0x50\n   kernel_read_file+0x1a9/0x2a0\n   init_module_from_file+0x6a/0xe0\n   idempotent_init_module+0x175/0x230\n   __x64_sys_finit_module+0x5d/0xb0\n   x64_sys_call+0x1c3/0x9e0\n   do_syscall_64+0x3d/0xc0\n   entry_SYSCALL_64_after_hwframe+0x4b/0x53\n   ......\n   </TASK>\n  ---[ end trace 0000000000000000 ]---\n\nThe warning is triggered as follows:\n\n1) syscall finit_module() handles the module insertion and it invokes\nkernel_read_file() to read the content of the module first.\n\n2) kernel_read_file() allocates a 10MB buffer by using vmalloc() and\npasses it to kernel_read(). kernel_read() constructs a kvec iter by\nusing iov_iter_kvec() and passes it to fuse_file_read_iter().\n\n3) virtio-fs disables the cache, so fuse_file_read_iter() invokes\nfuse_direct_io(). As for now, the maximal read size for kvec iter is\nonly limited by fc->max_read. For virtio-fs, max_read is UINT_MAX, so\nfuse_direct_io() doesn't split the 10MB buffer. It saves the address and\nthe size of the 10MB-sized buffer in out_args[0] of a fuse request and\npasses the fuse request to virtio_fs_wake_pending_and_unlock().\n\n4) virtio_fs_wake_pending_and_unlock() uses virtio_fs_enqueue_req() to\nqueue the request. Because virtiofs need DMA-able address, so\nvirtio_fs_enqueue_req() uses kmalloc() to allocate a bounce buffer for\nall fuse args, copies these args into the bounce buffer and passed the\nphysical address of the bounce buffer to virtiofsd. The total length of\nthese fuse args for the passed fuse request is about 10MB, so\ncopy_args_to_argbuf() invokes kmalloc() with a 10MB size parameter and\nit triggers the warning in __alloc_pages():\n\n\tif (WARN_ON_ONCE_GFP(order > MAX_PAGE_ORDER, gfp))\n\t\treturn NULL;\n\n5) virtio_fs_enqueue_req() will retry the memory allocation in a\nkworker, but it won't help, because kmalloc() will always return NULL\ndue to the abnormal size and finit_module() will hang forever.\n\nA feasible solution is to limit the value of max_read for virtio-fs, so\nthe length passed to kmalloc() will be limited. However it will affect\nthe maximal read size for normal read. And for virtio-fs write initiated\nfrom kernel, it has the similar problem but now there is no way to limit\nfc->max_write in kernel.\n\nSo instead of limiting both the values of max_read and max_write in\nkernel, introducing use_pages_for_kvec_io in fuse_conn and setting it as\ntrue in virtiofs. When use_pages_for_kvec_io is enabled, fuse will use\npages instead of pointer to pass the KVEC_IO data.\n\nAfter switching to pages for KVEC_IO data, these pages will be used for\nDMA through virtio-fs. If these pages are backed by vmalloc(),\n{flush|invalidate}_kernel_vmap_range() are necessary to flush or\ninvalidate the cache before the DMA operation. So add two new fields in\nfuse_args_pages to record the base address of vmalloc area and the\ncondition indicating whether invalidation is needed. Perform the flush\nin fuse_get_user_pages() for write operations and the invalidation in\nfuse_release_user_pages() for read operations.\n\nIt may seem necessary to introduce another fie\n---truncated---(CVE-2024-53219)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/mlx5: Move events notifier registration to be after device registration\n\nMove pkey change work initialization and cleanup from device resources\nstage to notifier stage, since this is the stage which handles this work\nevents.\n\nFix a race between the device deregistration and pkey change work by moving\nMLX5_IB_STAGE_DEVICE_NOTIFIER to be after MLX5_IB_STAGE_IB_REG in order to\nensure that the notifier is deregistered before the device during cleanup.\nWhich ensures there are no works that are being executed after the\ndevice has already unregistered which can cause the panic below.\n\nBUG: kernel NULL pointer dereference, address: 0000000000000000\nPGD 0 P4D 0\nOops: 0000 [#1] PREEMPT SMP PTI\nCPU: 1 PID: 630071 Comm: kworker/1:2 Kdump: loaded Tainted: G W OE --------- --- 5.14.0-162.6.1.el9_1.x86_64 #1\nHardware name: Microsoft Corporation Virtual Machine/Virtual Machine, BIOS 090008 02/27/2023\nWorkqueue: events pkey_change_handler [mlx5_ib]\nRIP: 0010:setup_qp+0x38/0x1f0 [mlx5_ib]\nCode: ee 41 54 45 31 e4 55 89 f5 53 48 89 fb 48 83 ec 20 8b 77 08 65 48 8b 04 25 28 00 00 00 48 89 44 24 18 48 8b 07 48 8d 4c 24 16 <4c> 8b 38 49 8b 87 80 0b 00 00 4c 89 ff 48 8b 80 08 05 00 00 8b 40\nRSP: 0018:ffffbcc54068be20 EFLAGS: 00010282\nRAX: 0000000000000000 RBX: ffff954054494128 RCX: ffffbcc54068be36\nRDX: ffff954004934000 RSI: 0000000000000001 RDI: ffff954054494128\nRBP: 0000000000000023 R08: ffff954001be2c20 R09: 0000000000000001\nR10: ffff954001be2c20 R11: ffff9540260133c0 R12: 0000000000000000\nR13: 0000000000000023 R14: 0000000000000000 R15: ffff9540ffcb0905\nFS: 0000000000000000(0000) GS:ffff9540ffc80000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000000000000000 CR3: 000000010625c001 CR4: 00000000003706e0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nCall Trace:\nmlx5_ib_gsi_pkey_change+0x20/0x40 [mlx5_ib]\nprocess_one_work+0x1e8/0x3c0\nworker_thread+0x50/0x3b0\n? rescuer_thread+0x380/0x380\nkthread+0x149/0x170\n? set_kthread_struct+0x50/0x50\nret_from_fork+0x22/0x30\nModules linked in: rdma_ucm(OE) rdma_cm(OE) iw_cm(OE) ib_ipoib(OE) ib_cm(OE) ib_umad(OE) mlx5_ib(OE) mlx5_fwctl(OE) fwctl(OE) ib_uverbs(OE) mlx5_core(OE) mlxdevm(OE) ib_core(OE) mlx_compat(OE) psample mlxfw(OE) tls knem(OE) netconsole nfsv3 nfs_acl nfs lockd grace fscache netfs qrtr rfkill sunrpc intel_rapl_msr intel_rapl_common rapl hv_balloon hv_utils i2c_piix4 pcspkr joydev fuse ext4 mbcache jbd2 sr_mod sd_mod cdrom t10_pi sg ata_generic pci_hyperv pci_hyperv_intf hyperv_drm drm_shmem_helper drm_kms_helper hv_storvsc syscopyarea hv_netvsc sysfillrect sysimgblt hid_hyperv fb_sys_fops scsi_transport_fc hyperv_keyboard drm ata_piix crct10dif_pclmul crc32_pclmul crc32c_intel libata ghash_clmulni_intel hv_vmbus serio_raw [last unloaded: ib_core]\nCR2: 0000000000000000\n---[ end trace f6f8be4eae12f7bc ]---(CVE-2024-53224)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/hns: Fix NULL pointer derefernce in hns_roce_map_mr_sg()\n\nib_map_mr_sg() allows ULPs to specify NULL as the sg_offset argument.\nThe driver needs to check whether it is a NULL pointer before\ndereferencing it.(CVE-2024-53226)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/rxe: Fix the qp flush warnings in req\n\nWhen the qp is in error state, the status of WQEs in the queue should be\nset to error. Or else the following will appear.\n\n[  920.617269] WARNING: CPU: 1 PID: 21 at drivers/infiniband/sw/rxe/rxe_comp.c:756 rxe_completer+0x989/0xcc0 [rdma_rxe]\n[  920.617744] Modules linked in: rnbd_client(O) rtrs_client(O) rtrs_core(O) rdma_ucm rdma_cm iw_cm ib_cm crc32_generic rdma_rxe ip6_udp_tunnel udp_tunnel ib_uverbs ib_core loop brd null_blk ipv6\n[  920.618516] CPU: 1 PID: 21 Comm: ksoftirqd/1 Tainted: G           O       6.1.113-storage+ #65\n[  920.618986] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 04/01/2014\n[  920.619396] RIP: 0010:rxe_completer+0x989/0xcc0 [rdma_rxe]\n[  920.619658] Code: 0f b6 84 24 3a 02 00 00 41 89 84 24 44 04 00 00 e9 2a f7 ff ff 39 ca bb 03 00 00 00 b8 0e 00 00 00 48 0f 45 d8 e9 15 f7 ff ff <0f> 0b e9 cb f8 ff ff 41 bf f5 ff ff ff e9 08 f8 ff ff 49 8d bc 24\n[  920.620482] RSP: 0018:ffff97b7c00bbc38 EFLAGS: 00010246\n[  920.620817] RAX: 0000000000000000 RBX: 000000000000000c RCX: 0000000000000008\n[  920.621183] RDX: ffff960dc396ebc0 RSI: 0000000000005400 RDI: ffff960dc4e2fbac\n[  920.621548] RBP: 0000000000000000 R08: 0000000000000001 R09: ffffffffac406450\n[  920.621884] R10: ffffffffac4060c0 R11: 0000000000000001 R12: ffff960dc4e2f800\n[  920.622254] R13: ffff960dc4e2f928 R14: ffff97b7c029c580 R15: 0000000000000000\n[  920.622609] FS:  0000000000000000(0000) GS:ffff960ef7d00000(0000) knlGS:0000000000000000\n[  920.622979] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[  920.623245] CR2: 00007fa056965e90 CR3: 00000001107f1000 CR4: 00000000000006e0\n[  920.623680] Call Trace:\n[  920.623815]  <TASK>\n[  920.623933]  ? __warn+0x79/0xc0\n[  920.624116]  ? rxe_completer+0x989/0xcc0 [rdma_rxe]\n[  920.624356]  ? report_bug+0xfb/0x150\n[  920.624594]  ? handle_bug+0x3c/0x60\n[  920.624796]  ? exc_invalid_op+0x14/0x70\n[  920.624976]  ? asm_exc_invalid_op+0x16/0x20\n[  920.625203]  ? rxe_completer+0x989/0xcc0 [rdma_rxe]\n[  920.625474]  ? rxe_completer+0x329/0xcc0 [rdma_rxe]\n[  920.625749]  rxe_do_task+0x80/0x110 [rdma_rxe]\n[  920.626037]  rxe_requester+0x625/0xde0 [rdma_rxe]\n[  920.626310]  ? rxe_cq_post+0xe2/0x180 [rdma_rxe]\n[  920.626583]  ? do_complete+0x18d/0x220 [rdma_rxe]\n[  920.626812]  ? rxe_completer+0x1a3/0xcc0 [rdma_rxe]\n[  920.627050]  rxe_do_task+0x80/0x110 [rdma_rxe]\n[  920.627285]  tasklet_action_common.constprop.0+0xa4/0x120\n[  920.627522]  handle_softirqs+0xc2/0x250\n[  920.627728]  ? sort_range+0x20/0x20\n[  920.627942]  run_ksoftirqd+0x1f/0x30\n[  920.628158]  smpboot_thread_fn+0xc7/0x1b0\n[  920.628334]  kthread+0xd6/0x100\n[  920.628504]  ? kthread_complete_and_exit+0x20/0x20\n[  920.628709]  ret_from_fork+0x1f/0x30\n[  920.628892]  </TASK>(CVE-2024-53229)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\ncpufreq: CPPC: Fix possible null-ptr-deref for cpufreq_cpu_get_raw()\n\ncpufreq_cpu_get_raw() may return NULL if the cpu is not in\npolicy->cpus cpu mask and it will cause null pointer dereference.(CVE-2024-53231)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nerofs: handle NONHEAD !delta[1] lclusters gracefully\n\nsyzbot reported a WARNING in iomap_iter_done:\n iomap_fiemap+0x73b/0x9b0 fs/iomap/fiemap.c:80\n ioctl_fiemap fs/ioctl.c:220 [inline]\n\nGenerally, NONHEAD lclusters won't have delta[1]==0, except for crafted\nimages and filesystems created by pre-1.0 mkfs versions.\n\nPreviously, it would immediately bail out if delta[1]==0, which led to\ninadequate decompressed lengths (thus FIEMAP is impacted).  Treat it as\ndelta[1]=1 to work around these legacy mkfs versions.\n\n`lclusterbits > 14` is illegal for compact indexes, error out too.(CVE-2024-53234)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nALSA: 6fire: Release resources at card release\n\nThe current 6fire code tries to release the resources right after the\ncall of usb6fire_chip_abort().  But at this moment, the card object\nmight be still in use (as we're calling snd_card_free_when_closed()).\n\nFor avoid potential UAFs, move the release of resources to the card's\nprivate_free instead of the manual call of usb6fire_chip_destroy() at\nthe USB disconnect callback.(CVE-2024-53239)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nx86/xen: don't do PV iret hypercall through hypercall page\n\nInstead of jumping to the Xen hypercall page for doing the iret\nhypercall, directly code the required sequence in xen-asm.S.\n\nThis is done in preparation of no longer using hypercall page at all,\nas it has shown to cause problems with speculation mitigations.\n\nThis is part of XSA-466 / CVE-2024-53241.(CVE-2024-53241)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nnet: renesas: rswitch: avoid use-after-put for a device tree node\n\nThe device tree node saved in the rswitch_device structure is used at\nseveral driver locations. So passing this node to of_node_put() after\nthe first use is wrong.\n\nMove of_node_put() for this node to exit paths.(CVE-2024-55639)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nwifi: ath12k: Skip Rx TID cleanup for self peer\n\nDuring peer create, dp setup for the peer is done where Rx TID is\nupdated for all the TIDs. Peer object for self peer will not go through\ndp setup.\n\nWhen core halts, dp cleanup is done for all the peers. While cleanup,\nrx_tid::ab is accessed which causes below stack trace for self peer.\n\nWARNING: CPU: 6 PID: 12297 at drivers/net/wireless/ath/ath12k/dp_rx.c:851\nCall Trace:\n__warn+0x7b/0x1a0\nath12k_dp_rx_frags_cleanup+0xd2/0xe0 [ath12k]\nreport_bug+0x10b/0x200\nhandle_bug+0x3f/0x70\nexc_invalid_op+0x13/0x60\nasm_exc_invalid_op+0x16/0x20\nath12k_dp_rx_frags_cleanup+0xd2/0xe0 [ath12k]\nath12k_dp_rx_frags_cleanup+0xca/0xe0 [ath12k]\nath12k_dp_rx_peer_tid_cleanup+0x39/0xa0 [ath12k]\nath12k_mac_peer_cleanup_all+0x61/0x100 [ath12k]\nath12k_core_halt+0x3b/0x100 [ath12k]\nath12k_core_reset+0x494/0x4c0 [ath12k]\n\nsta object in peer will be updated when remote peer is created. Hence\nuse peer::sta to detect the self peer and skip the cleanup.\n\nTested-on: QCN9274 hw2.0 PCI WLAN.WBE.1.0.1-00029-QCAHKSWPL_SILICONZ-1\nTested-on: WCN7850 hw2.0 PCI WLAN.HMT.1.0.c5-00481-QCAHMTSWPL_V1.0_V2.0_SILICONZ-3(CVE-2024-56543)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\ndrivers: soc: xilinx: add the missing kfree in xlnx_add_cb_for_suspend()\n\nIf we fail to allocate memory for cb_data by kmalloc, the memory\nallocation for eve_data is never freed, add the missing kfree()\nin the error handling path.(CVE-2024-56546)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\ncachefiles: Fix NULL pointer dereference in object->file\n\nAt present, the object->file has the NULL pointer dereference problem in\nondemand-mode. The root cause is that the allocated fd and object->file\nlifetime are inconsistent, and the user-space invocation to anon_fd uses\nobject->file. Following is the process that triggers the issue:\n\n\t  [write fd]\t\t\t\t[umount]\ncachefiles_ondemand_fd_write_iter\n\t\t\t\t       fscache_cookie_state_machine\n\t\t\t\t\t cachefiles_withdraw_cookie\n  if (!file) return -ENOBUFS\n\t\t\t\t\t   cachefiles_clean_up_object\n\t\t\t\t\t     cachefiles_unmark_inode_in_use\n\t\t\t\t\t     fput(object->file)\n\t\t\t\t\t     object->file = NULL\n  // file NULL pointer dereference!\n  __cachefiles_write(..., file, ...)\n\nFix this issue by add an additional reference count to the object->file\nbefore write/llseek, and decrement after it finished.(CVE-2024-56549)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\ni3c: master: Fix miss free init_dyn_addr at i3c_master_put_i3c_addrs()\n\nif (dev->boardinfo && dev->boardinfo->init_dyn_addr)\n                                      ^^^ here check \"init_dyn_addr\"\n\ti3c_bus_set_addr_slot_status(&master->bus, dev->info.dyn_addr, ...)\n\t\t\t\t\t\t             ^^^^\n\t\t\t\t\t\t\tfree \"dyn_addr\"\nFix copy/paste error \"dyn_addr\" by replacing it with \"init_dyn_addr\".(CVE-2024-56562)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\novl: Filter invalid inodes with missing lookup function\n\nAdd a check to the ovl_dentry_weird() function to prevent the\nprocessing of directory inodes that lack the lookup function.\nThis is important because such inodes can cause errors in overlayfs\nwhen passed to the lowerstack.(CVE-2024-56570)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nmedia: platform: allegro-dvt: Fix possible memory leak in allocate_buffers_internal()\n\nThe buffer in the loop should be released under the exception path,\notherwise there may be a memory leak here.\n\nTo mitigate this, free the buffer when allegro_alloc_buffer fails.(CVE-2024-56572)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: fix use-after-free in btrfs_encoded_read_endio()\n\nShinichiro reported the following use-after free that sometimes is\nhappening in our CI system when running fstests' btrfs/284 on a TCMU\nrunner device:\n\n  BUG: KASAN: slab-use-after-free in lock_release+0x708/0x780\n  Read of size 8 at addr ffff888106a83f18 by task kworker/u80:6/219\n\n  CPU: 8 UID: 0 PID: 219 Comm: kworker/u80:6 Not tainted 6.12.0-rc6-kts+ #15\n  Hardware name: Supermicro Super Server/X11SPi-TF, BIOS 3.3 02/21/2020\n  Workqueue: btrfs-endio btrfs_end_bio_work [btrfs]\n  Call Trace:\n   <TASK>\n   dump_stack_lvl+0x6e/0xa0\n   ? lock_release+0x708/0x780\n   print_report+0x174/0x505\n   ? lock_release+0x708/0x780\n   ? __virt_addr_valid+0x224/0x410\n   ? lock_release+0x708/0x780\n   kasan_report+0xda/0x1b0\n   ? lock_release+0x708/0x780\n   ? __wake_up+0x44/0x60\n   lock_release+0x708/0x780\n   ? __pfx_lock_release+0x10/0x10\n   ? __pfx_do_raw_spin_lock+0x10/0x10\n   ? lock_is_held_type+0x9a/0x110\n   _raw_spin_unlock_irqrestore+0x1f/0x60\n   __wake_up+0x44/0x60\n   btrfs_encoded_read_endio+0x14b/0x190 [btrfs]\n   btrfs_check_read_bio+0x8d9/0x1360 [btrfs]\n   ? lock_release+0x1b0/0x780\n   ? trace_lock_acquire+0x12f/0x1a0\n   ? __pfx_btrfs_check_read_bio+0x10/0x10 [btrfs]\n   ? process_one_work+0x7e3/0x1460\n   ? lock_acquire+0x31/0xc0\n   ? process_one_work+0x7e3/0x1460\n   process_one_work+0x85c/0x1460\n   ? __pfx_process_one_work+0x10/0x10\n   ? assign_work+0x16c/0x240\n   worker_thread+0x5e6/0xfc0\n   ? __pfx_worker_thread+0x10/0x10\n   kthread+0x2c3/0x3a0\n   ? __pfx_kthread+0x10/0x10\n   ret_from_fork+0x31/0x70\n   ? __pfx_kthread+0x10/0x10\n   ret_from_fork_asm+0x1a/0x30\n   </TASK>\n\n  Allocated by task 3661:\n   kasan_save_stack+0x30/0x50\n   kasan_save_track+0x14/0x30\n   __kasan_kmalloc+0xaa/0xb0\n   btrfs_encoded_read_regular_fill_pages+0x16c/0x6d0 [btrfs]\n   send_extent_data+0xf0f/0x24a0 [btrfs]\n   process_extent+0x48a/0x1830 [btrfs]\n   changed_cb+0x178b/0x2ea0 [btrfs]\n   btrfs_ioctl_send+0x3bf9/0x5c20 [btrfs]\n   _btrfs_ioctl_send+0x117/0x330 [btrfs]\n   btrfs_ioctl+0x184a/0x60a0 [btrfs]\n   __x64_sys_ioctl+0x12e/0x1a0\n   do_syscall_64+0x95/0x180\n   entry_SYSCALL_64_after_hwframe+0x76/0x7e\n\n  Freed by task 3661:\n   kasan_save_stack+0x30/0x50\n   kasan_save_track+0x14/0x30\n   kasan_save_free_info+0x3b/0x70\n   __kasan_slab_free+0x4f/0x70\n   kfree+0x143/0x490\n   btrfs_encoded_read_regular_fill_pages+0x531/0x6d0 [btrfs]\n   send_extent_data+0xf0f/0x24a0 [btrfs]\n   process_extent+0x48a/0x1830 [btrfs]\n   changed_cb+0x178b/0x2ea0 [btrfs]\n   btrfs_ioctl_send+0x3bf9/0x5c20 [btrfs]\n   _btrfs_ioctl_send+0x117/0x330 [btrfs]\n   btrfs_ioctl+0x184a/0x60a0 [btrfs]\n   __x64_sys_ioctl+0x12e/0x1a0\n   do_syscall_64+0x95/0x180\n   entry_SYSCALL_64_after_hwframe+0x76/0x7e\n\n  The buggy address belongs to the object at ffff888106a83f00\n   which belongs to the cache kmalloc-rnd-07-96 of size 96\n  The buggy address is located 24 bytes inside of\n   freed 96-byte region [ffff888106a83f00, ffff888106a83f60)\n\n  The buggy address belongs to the physical page:\n  page: refcount:1 mapcount:0 mapping:0000000000000000 index:0xffff888106a83800 pfn:0x106a83\n  flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff)\n  page_type: f5(slab)\n  raw: 0017ffffc0000000 ffff888100053680 ffffea0004917200 0000000000000004\n  raw: ffff888106a83800 0000000080200019 00000001f5000000 0000000000000000\n  page dumped because: kasan: bad access detected\n\n  Memory state around the buggy address:\n   ffff888106a83e00: fa fb fb fb fb fb fb fb fb fb fb fb fc fc fc fc\n   ffff888106a83e80: fa fb fb fb fb fb fb fb fb fb fb fb fc fc fc fc\n  >ffff888106a83f00: fa fb fb fb fb fb fb fb fb fb fb fb fc fc fc fc\n                              ^\n   ffff888106a83f80: fa fb fb fb fb fb fb fb fb fb fb fb fc fc fc fc\n   ffff888106a84000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00\n  ==================================================================\n\nFurther analyzing the trace and \n---truncated---(CVE-2024-56582)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nsched/deadline: Fix warning in migrate_enable for boosted tasks\n\nWhen running the following command:\n\nwhile true; do\n    stress-ng --cyclic 30 --timeout 30s --minimize --quiet\ndone\n\na warning is eventually triggered:\n\nWARNING: CPU: 43 PID: 2848 at kernel/sched/deadline.c:794\nsetup_new_dl_entity+0x13e/0x180\n...\nCall Trace:\n <TASK>\n ? show_trace_log_lvl+0x1c4/0x2df\n ? enqueue_dl_entity+0x631/0x6e0\n ? setup_new_dl_entity+0x13e/0x180\n ? __warn+0x7e/0xd0\n ? report_bug+0x11a/0x1a0\n ? handle_bug+0x3c/0x70\n ? exc_invalid_op+0x14/0x70\n ? asm_exc_invalid_op+0x16/0x20\n enqueue_dl_entity+0x631/0x6e0\n enqueue_task_dl+0x7d/0x120\n __do_set_cpus_allowed+0xe3/0x280\n __set_cpus_allowed_ptr_locked+0x140/0x1d0\n __set_cpus_allowed_ptr+0x54/0xa0\n migrate_enable+0x7e/0x150\n rt_spin_unlock+0x1c/0x90\n group_send_sig_info+0xf7/0x1a0\n ? kill_pid_info+0x1f/0x1d0\n kill_pid_info+0x78/0x1d0\n kill_proc_info+0x5b/0x110\n __x64_sys_kill+0x93/0xc0\n do_syscall_64+0x5c/0xf0\n entry_SYSCALL_64_after_hwframe+0x6e/0x76\n RIP: 0033:0x7f0dab31f92b\n\nThis warning occurs because set_cpus_allowed dequeues and enqueues tasks\nwith the ENQUEUE_RESTORE flag set. If the task is boosted, the warning\nis triggered. A boosted task already had its parameters set by\nrt_mutex_setprio, and a new call to setup_new_dl_entity is unnecessary,\nhence the WARN_ON call.\n\nCheck if we are requeueing a boosted task and avoid calling\nsetup_new_dl_entity if that's the case.(CVE-2024-56583)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nLoongArch: Fix sleeping in atomic context for PREEMPT_RT\n\nCommit bab1c299f3945ffe79 (\"LoongArch: Fix sleeping in atomic context in\nsetup_tlb_handler()\") changes the gfp flag from GFP_KERNEL to GFP_ATOMIC\nfor alloc_pages_node(). However, for PREEMPT_RT kernels we can still get\na \"sleeping in atomic context\" error:\n\n[    0.372259] BUG: sleeping function called from invalid context at kernel/locking/spinlock_rt.c:48\n[    0.372266] in_atomic(): 1, irqs_disabled(): 1, non_block: 0, pid: 0, name: swapper/1\n[    0.372268] preempt_count: 1, expected: 0\n[    0.372270] RCU nest depth: 1, expected: 1\n[    0.372272] 3 locks held by swapper/1/0:\n[    0.372274]  #0: 900000000c9f5e60 (&pcp->lock){+.+.}-{3:3}, at: get_page_from_freelist+0x524/0x1c60\n[    0.372294]  #1: 90000000087013b8 (rcu_read_lock){....}-{1:3}, at: rt_spin_trylock+0x50/0x140\n[    0.372305]  #2: 900000047fffd388 (&zone->lock){+.+.}-{3:3}, at: __rmqueue_pcplist+0x30c/0xea0\n[    0.372314] irq event stamp: 0\n[    0.372316] hardirqs last  enabled at (0): [<0000000000000000>] 0x0\n[    0.372322] hardirqs last disabled at (0): [<9000000005947320>] copy_process+0x9c0/0x26e0\n[    0.372329] softirqs last  enabled at (0): [<9000000005947320>] copy_process+0x9c0/0x26e0\n[    0.372335] softirqs last disabled at (0): [<0000000000000000>] 0x0\n[    0.372341] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Not tainted 6.12.0-rc7+ #1891\n[    0.372346] Hardware name: Loongson Loongson-3A5000-7A1000-1w-CRB/Loongson-LS3A5000-7A1000-1w-CRB, BIOS vUDK2018-LoongArch-V2.0.0-prebeta9 10/21/2022\n[    0.372349] Stack : 0000000000000089 9000000005a0db9c 90000000071519c8 9000000100388000\n[    0.372486]         900000010038b890 0000000000000000 900000010038b898 9000000007e53788\n[    0.372492]         900000000815bcc8 900000000815bcc0 900000010038b700 0000000000000001\n[    0.372498]         0000000000000001 4b031894b9d6b725 00000000055ec000 9000000100338fc0\n[    0.372503]         00000000000000c4 0000000000000001 000000000000002d 0000000000000003\n[    0.372509]         0000000000000030 0000000000000003 00000000055ec000 0000000000000003\n[    0.372515]         900000000806d000 9000000007e53788 00000000000000b0 0000000000000004\n[    0.372521]         0000000000000000 0000000000000000 900000000c9f5f10 0000000000000000\n[    0.372526]         90000000076f12d8 9000000007e53788 9000000005924778 0000000000000000\n[    0.372532]         00000000000000b0 0000000000000004 0000000000000000 0000000000070000\n[    0.372537]         ...\n[    0.372540] Call Trace:\n[    0.372542] [<9000000005924778>] show_stack+0x38/0x180\n[    0.372548] [<90000000071519c4>] dump_stack_lvl+0x94/0xe4\n[    0.372555] [<900000000599b880>] __might_resched+0x1a0/0x260\n[    0.372561] [<90000000071675cc>] rt_spin_lock+0x4c/0x140\n[    0.372565] [<9000000005cbb768>] __rmqueue_pcplist+0x308/0xea0\n[    0.372570] [<9000000005cbed84>] get_page_from_freelist+0x564/0x1c60\n[    0.372575] [<9000000005cc0d98>] __alloc_pages_noprof+0x218/0x1820\n[    0.372580] [<900000000593b36c>] tlb_init+0x1ac/0x298\n[    0.372585] [<9000000005924b74>] per_cpu_trap_init+0x114/0x140\n[    0.372589] [<9000000005921964>] cpu_probe+0x4e4/0xa60\n[    0.372592] [<9000000005934874>] start_secondary+0x34/0xc0\n[    0.372599] [<900000000715615c>] smpboot_entry+0x64/0x6c\n\nThis is because in PREEMPT_RT kernels normal spinlocks are replaced by\nrt spinlocks and rt_spin_lock() will cause sleeping. Fix it by disabling\nNUMA optimization completely for PREEMPT_RT kernels.(CVE-2024-56585)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nf2fs: fix f2fs_bug_on when uninstalling filesystem call f2fs_evict_inode.\n\ncreating a large files during checkpoint disable until it runs out of\nspace and then delete it, then remount to enable checkpoint again, and\nthen unmount the filesystem triggers the f2fs_bug_on as below:\n\n------------[ cut here ]------------\nkernel BUG at fs/f2fs/inode.c:896!\nCPU: 2 UID: 0 PID: 1286 Comm: umount Not tainted 6.11.0-rc7-dirty #360\nOops: invalid opcode: 0000 [#1] PREEMPT SMP NOPTI\nRIP: 0010:f2fs_evict_inode+0x58c/0x610\nCall Trace:\n __die_body+0x15/0x60\n die+0x33/0x50\n do_trap+0x10a/0x120\n f2fs_evict_inode+0x58c/0x610\n do_error_trap+0x60/0x80\n f2fs_evict_inode+0x58c/0x610\n exc_invalid_op+0x53/0x60\n f2fs_evict_inode+0x58c/0x610\n asm_exc_invalid_op+0x16/0x20\n f2fs_evict_inode+0x58c/0x610\n evict+0x101/0x260\n dispose_list+0x30/0x50\n evict_inodes+0x140/0x190\n generic_shutdown_super+0x2f/0x150\n kill_block_super+0x11/0x40\n kill_f2fs_super+0x7d/0x140\n deactivate_locked_super+0x2a/0x70\n cleanup_mnt+0xb3/0x140\n task_work_run+0x61/0x90\n\nThe root cause is: creating large files during disable checkpoint\nperiod results in not enough free segments, so when writing back root\ninode will failed in f2fs_enable_checkpoint. When umount the file\nsystem after enabling checkpoint, the root inode is dirty in\nf2fs_evict_inode function, which triggers BUG_ON. The steps to\nreproduce are as follows:\n\ndd if=/dev/zero of=f2fs.img bs=1M count=55\nmount f2fs.img f2fs_dir -o checkpoint=disable:10%\ndd if=/dev/zero of=big bs=1M count=50\nsync\nrm big\nmount -o remount,checkpoint=enable f2fs_dir\numount f2fs_dir\n\nLet's redirty inode when there is not free segments during checkpoint\nis disable.(CVE-2024-56586)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Call free_htab_elem() after htab_unlock_bucket()\n\nFor htab of maps, when the map is removed from the htab, it may hold the\nlast reference of the map. bpf_map_fd_put_ptr() will invoke\nbpf_map_free_id() to free the id of the removed map element. However,\nbpf_map_fd_put_ptr() is invoked while holding a bucket lock\n(raw_spin_lock_t), and bpf_map_free_id() attempts to acquire map_idr_lock\n(spinlock_t), triggering the following lockdep warning:\n\n  =============================\n  [ BUG: Invalid wait context ]\n  6.11.0-rc4+ #49 Not tainted\n  -----------------------------\n  test_maps/4881 is trying to lock:\n  ffffffff84884578 (map_idr_lock){+...}-{3:3}, at: bpf_map_free_id.part.0+0x21/0x70\n  other info that might help us debug this:\n  context-{5:5}\n  2 locks held by test_maps/4881:\n   #0: ffffffff846caf60 (rcu_read_lock){....}-{1:3}, at: bpf_fd_htab_map_update_elem+0xf9/0x270\n   #1: ffff888149ced148 (&htab->lockdep_key#2){....}-{2:2}, at: htab_map_update_elem+0x178/0xa80\n  stack backtrace:\n  CPU: 0 UID: 0 PID: 4881 Comm: test_maps Not tainted 6.11.0-rc4+ #49\n  Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), ...\n  Call Trace:\n   <TASK>\n   dump_stack_lvl+0x6e/0xb0\n   dump_stack+0x10/0x20\n   __lock_acquire+0x73e/0x36c0\n   lock_acquire+0x182/0x450\n   _raw_spin_lock_irqsave+0x43/0x70\n   bpf_map_free_id.part.0+0x21/0x70\n   bpf_map_put+0xcf/0x110\n   bpf_map_fd_put_ptr+0x9a/0xb0\n   free_htab_elem+0x69/0xe0\n   htab_map_update_elem+0x50f/0xa80\n   bpf_fd_htab_map_update_elem+0x131/0x270\n   htab_map_update_elem+0x50f/0xa80\n   bpf_fd_htab_map_update_elem+0x131/0x270\n   bpf_map_update_value+0x266/0x380\n   __sys_bpf+0x21bb/0x36b0\n   __x64_sys_bpf+0x45/0x60\n   x64_sys_call+0x1b2a/0x20d0\n   do_syscall_64+0x5d/0x100\n   entry_SYSCALL_64_after_hwframe+0x76/0x7e\n\nOne way to fix the lockdep warning is using raw_spinlock_t for\nmap_idr_lock as well. However, bpf_map_alloc_id() invokes\nidr_alloc_cyclic() after acquiring map_idr_lock, it will trigger a\nsimilar lockdep warning because the slab's lock (s->cpu_slab->lock) is\nstill a spinlock.\n\nInstead of changing map_idr_lock's type, fix the issue by invoking\nhtab_put_fd_value() after htab_unlock_bucket(). However, only deferring\nthe invocation of htab_put_fd_value() is not enough, because the old map\npointers in htab of maps can not be saved during batched deletion.\nTherefore, also defer the invocation of free_htab_elem(), so these\nto-be-freed elements could be linked together similar to lru map.\n\nThere are four callers for ->map_fd_put_ptr:\n\n(1) alloc_htab_elem() (through htab_put_fd_value())\nIt invokes ->map_fd_put_ptr() under a raw_spinlock_t. The invocation of\nhtab_put_fd_value() can not simply move after htab_unlock_bucket(),\nbecause the old element has already been stashed in htab->extra_elems.\nIt may be reused immediately after htab_unlock_bucket() and the\ninvocation of htab_put_fd_value() after htab_unlock_bucket() may release\nthe newly-added element incorrectly. Therefore, saving the map pointer\nof the old element for htab of maps before unlocking the bucket and\nreleasing the map_ptr after unlock. Beside the map pointer in the old\nelement, should do the same thing for the special fields in the old\nelement as well.\n\n(2) free_htab_elem() (through htab_put_fd_value())\nIts caller includes __htab_map_lookup_and_delete_elem(),\nhtab_map_delete_elem() and __htab_map_lookup_and_delete_batch().\n\nFor htab_map_delete_elem(), simply invoke free_htab_elem() after\nhtab_unlock_bucket(). For __htab_map_lookup_and_delete_batch(), just\nlike lru map, linking the to-be-freed element into node_to_free list\nand invoking free_htab_elem() for these element after unlock. It is safe\nto reuse batch_flink as the link for node_to_free, because these\nelements have been removed from the hash llist.\n\nBecause htab of maps doesn't support lookup_and_delete operation,\n__htab_map_lookup_and_delete_elem() doesn't have the problem, so kept\nit as\n---truncated---(CVE-2024-56592)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amdgpu: set the right AMDGPU sg segment limitation\n\nThe driver needs to set the correct max_segment_size;\notherwise debug_dma_map_sg() will complain about the\nover-mapping of the AMDGPU sg length as following:\n\nWARNING: CPU: 6 PID: 1964 at kernel/dma/debug.c:1178 debug_dma_map_sg+0x2dc/0x370\n[  364.049444] Modules linked in: veth amdgpu(OE) amdxcp drm_exec gpu_sched drm_buddy drm_ttm_helper ttm(OE) drm_suballoc_helper drm_display_helper drm_kms_helper i2c_algo_bit rpcsec_gss_krb5 auth_rpcgss nfsv4 nfs lockd grace netfs xt_conntrack xt_MASQUERADE nf_conntrack_netlink xfrm_user xfrm_algo iptable_nat xt_addrtype iptable_filter br_netfilter nvme_fabrics overlay nfnetlink_cttimeout nfnetlink openvswitch nsh nf_conncount nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 libcrc32c bridge stp llc amd_atl intel_rapl_msr intel_rapl_common sunrpc sch_fq_codel snd_hda_codec_realtek snd_hda_codec_generic snd_hda_scodec_component snd_hda_codec_hdmi snd_hda_intel snd_intel_dspcfg edac_mce_amd binfmt_misc snd_hda_codec snd_pci_acp6x snd_hda_core snd_acp_config snd_hwdep snd_soc_acpi kvm_amd snd_pcm kvm snd_seq_midi snd_seq_midi_event crct10dif_pclmul ghash_clmulni_intel sha512_ssse3 snd_rawmidi sha256_ssse3 sha1_ssse3 aesni_intel snd_seq nls_iso8859_1 crypto_simd snd_seq_device cryptd snd_timer rapl input_leds snd\n[  364.049532]  ipmi_devintf wmi_bmof ccp serio_raw k10temp sp5100_tco soundcore ipmi_msghandler cm32181 industrialio mac_hid msr parport_pc ppdev lp parport drm efi_pstore ip_tables x_tables pci_stub crc32_pclmul nvme ahci libahci i2c_piix4 r8169 nvme_core i2c_designware_pci realtek i2c_ccgx_ucsi video wmi hid_generic cdc_ether usbnet usbhid hid r8152 mii\n[  364.049576] CPU: 6 PID: 1964 Comm: rocminfo Tainted: G           OE      6.10.0-custom #492\n[  364.049579] Hardware name: AMD Majolica-RN/Majolica-RN, BIOS RMJ1009A 06/13/2021\n[  364.049582] RIP: 0010:debug_dma_map_sg+0x2dc/0x370\n[  364.049585] Code: 89 4d b8 e8 36 b1 86 00 8b 4d b8 48 8b 55 b0 44 8b 45 a8 4c 8b 4d a0 48 89 c6 48 c7 c7 00 4b 74 bc 4c 89 4d b8 e8 b4 73 f3 ff <0f> 0b 4c 8b 4d b8 8b 15 c8 2c b8 01 85 d2 0f 85 ee fd ff ff 8b 05\n[  364.049588] RSP: 0018:ffff9ca600b57ac0 EFLAGS: 00010286\n[  364.049590] RAX: 0000000000000000 RBX: ffff88b7c132b0c8 RCX: 0000000000000027\n[  364.049592] RDX: ffff88bb0f521688 RSI: 0000000000000001 RDI: ffff88bb0f521680\n[  364.049594] RBP: ffff9ca600b57b20 R08: 000000000000006f R09: ffff9ca600b57930\n[  364.049596] R10: ffff9ca600b57928 R11: ffffffffbcb46328 R12: 0000000000000000\n[  364.049597] R13: 0000000000000001 R14: ffff88b7c19c0700 R15: ffff88b7c9059800\n[  364.049599] FS:  00007fb2d3516e80(0000) GS:ffff88bb0f500000(0000) knlGS:0000000000000000\n[  364.049601] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[  364.049603] CR2: 000055610bd03598 CR3: 00000001049f6000 CR4: 0000000000350ef0\n[  364.049605] Call Trace:\n[  364.049607]  <TASK>\n[  364.049609]  ? show_regs+0x6d/0x80\n[  364.049614]  ? __warn+0x8c/0x140\n[  364.049618]  ? debug_dma_map_sg+0x2dc/0x370\n[  364.049621]  ? report_bug+0x193/0x1a0\n[  364.049627]  ? handle_bug+0x46/0x80\n[  364.049631]  ? exc_invalid_op+0x1d/0x80\n[  364.049635]  ? asm_exc_invalid_op+0x1f/0x30\n[  364.049642]  ? debug_dma_map_sg+0x2dc/0x370\n[  364.049647]  __dma_map_sg_attrs+0x90/0xe0\n[  364.049651]  dma_map_sgtable+0x25/0x40\n[  364.049654]  amdgpu_bo_move+0x59a/0x850 [amdgpu]\n[  364.049935]  ? srso_return_thunk+0x5/0x5f\n[  364.049939]  ? amdgpu_ttm_tt_populate+0x5d/0xc0 [amdgpu]\n[  364.050095]  ttm_bo_handle_move_mem+0xc3/0x180 [ttm]\n[  364.050103]  ttm_bo_validate+0xc1/0x160 [ttm]\n[  364.050108]  ? amdgpu_ttm_tt_get_user_pages+0xe5/0x1b0 [amdgpu]\n[  364.050263]  amdgpu_amdkfd_gpuvm_alloc_memory_of_gpu+0xa12/0xc90 [amdgpu]\n[  364.050473]  kfd_ioctl_alloc_memory_of_gpu+0x16b/0x3b0 [amdgpu]\n[  364.050680]  kfd_ioctl+0x3c2/0x530 [amdgpu]\n[  364.050866]  ? __pfx_kfd_ioctl_alloc_memory_of_gpu+0x10/0x10 [amdgpu]\n[  364.05105\n---truncated---(CVE-2024-56594)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\njfs: add a check to prevent array-index-out-of-bounds in dbAdjTree\n\nWhen the value of lp is 0 at the beginning of the for loop, it will\nbecome negative in the next assignment and we should bail out.(CVE-2024-56595)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\njfs: fix array-index-out-of-bounds in jfs_readdir\n\nThe stbl might contain some invalid values. Added a check to\nreturn error code in that case.(CVE-2024-56596)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\njfs: fix shift-out-of-bounds in dbSplit\n\nWhen dmt_budmin is less than zero, it causes errors\nin the later stages. Added a check to return an error beforehand\nin dbAllocCtl itself.(CVE-2024-56597)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: L2CAP: do not leave dangling sk pointer on error in l2cap_sock_create()\n\nbt_sock_alloc() allocates the sk object and attaches it to the provided\nsock object. On error l2cap_sock_alloc() frees the sk object, but the\ndangling pointer is still attached to the sock object, which may create\nuse-after-free in other code.(CVE-2024-56605)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nwifi: rtw88: use ieee80211_purge_tx_queue() to purge TX skb\n\nWhen removing kernel modules by:\n   rmmod rtw88_8723cs rtw88_8703b rtw88_8723x rtw88_sdio rtw88_core\n\nDriver uses skb_queue_purge() to purge TX skb, but not report tx status\ncausing \"Have pending ack frames!\" warning. Use ieee80211_purge_tx_queue()\nto correct this.\n\nSince ieee80211_purge_tx_queue() doesn't take locks, to prevent racing\nbetween TX work and purge TX queue, flush and destroy TX work in advance.\n\n   wlan0: deauthenticating from aa:f5:fd:60:4c:a8 by local\n     choice (Reason: 3=DEAUTH_LEAVING)\n   ------------[ cut here ]------------\n   Have pending ack frames!\n   WARNING: CPU: 3 PID: 9232 at net/mac80211/main.c:1691\n       ieee80211_free_ack_frame+0x5c/0x90 [mac80211]\n   CPU: 3 PID: 9232 Comm: rmmod Tainted: G         C\n       6.10.1-200.fc40.aarch64 #1\n   Hardware name: pine64 Pine64 PinePhone Braveheart\n      (1.1)/Pine64 PinePhone Braveheart (1.1), BIOS 2024.01 01/01/2024\n   pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n   pc : ieee80211_free_ack_frame+0x5c/0x90 [mac80211]\n   lr : ieee80211_free_ack_frame+0x5c/0x90 [mac80211]\n   sp : ffff80008c1b37b0\n   x29: ffff80008c1b37b0 x28: ffff000003be8000 x27: 0000000000000000\n   x26: 0000000000000000 x25: ffff000003dc14b8 x24: ffff80008c1b37d0\n   x23: ffff000000ff9f80 x22: 0000000000000000 x21: 000000007fffffff\n   x20: ffff80007c7e93d8 x19: ffff00006e66f400 x18: 0000000000000000\n   x17: ffff7ffffd2b3000 x16: ffff800083fc0000 x15: 0000000000000000\n   x14: 0000000000000000 x13: 2173656d61726620 x12: 6b636120676e6964\n   x11: 0000000000000000 x10: 000000000000005d x9 : ffff8000802af2b0\n   x8 : ffff80008c1b3430 x7 : 0000000000000001 x6 : 0000000000000001\n   x5 : 0000000000000000 x4 : 0000000000000000 x3 : 0000000000000000\n   x2 : 0000000000000000 x1 : 0000000000000000 x0 : ffff000003be8000\n   Call trace:\n    ieee80211_free_ack_frame+0x5c/0x90 [mac80211]\n    idr_for_each+0x74/0x110\n    ieee80211_free_hw+0x44/0xe8 [mac80211]\n    rtw_sdio_remove+0x9c/0xc0 [rtw88_sdio]\n    sdio_bus_remove+0x44/0x180\n    device_remove+0x54/0x90\n    device_release_driver_internal+0x1d4/0x238\n    driver_detach+0x54/0xc0\n    bus_remove_driver+0x78/0x108\n    driver_unregister+0x38/0x78\n    sdio_unregister_driver+0x2c/0x40\n    rtw_8723cs_driver_exit+0x18/0x1000 [rtw88_8723cs]\n    __do_sys_delete_module.isra.0+0x190/0x338\n    __arm64_sys_delete_module+0x1c/0x30\n    invoke_syscall+0x74/0x100\n    el0_svc_common.constprop.0+0x48/0xf0\n    do_el0_svc+0x24/0x38\n    el0_svc+0x3c/0x158\n    el0t_64_sync_handler+0x120/0x138\n    el0t_64_sync+0x194/0x198\n   ---[ end trace 0000000000000000 ]---(CVE-2024-56609)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nsched/numa: fix memory leak due to the overwritten vma->numab_state\n\n[Problem Description]\nWhen running the hackbench program of LTP, the following memory leak is\nreported by kmemleak.\n\n  # /opt/ltp/testcases/bin/hackbench 20 thread 1000\n  Running with 20*40 (== 800) tasks.\n\n  # dmesg | grep kmemleak\n  ...\n  kmemleak: 480 new suspected memory leaks (see /sys/kernel/debug/kmemleak)\n  kmemleak: 665 new suspected memory leaks (see /sys/kernel/debug/kmemleak)\n\n  # cat /sys/kernel/debug/kmemleak\n  unreferenced object 0xffff888cd8ca2c40 (size 64):\n    comm \"hackbench\", pid 17142, jiffies 4299780315\n    hex dump (first 32 bytes):\n      ac 74 49 00 01 00 00 00 4c 84 49 00 01 00 00 00  .tI.....L.I.....\n      00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................\n    backtrace (crc bff18fd4):\n      [<ffffffff81419a89>] __kmalloc_cache_noprof+0x2f9/0x3f0\n      [<ffffffff8113f715>] task_numa_work+0x725/0xa00\n      [<ffffffff8110f878>] task_work_run+0x58/0x90\n      [<ffffffff81ddd9f8>] syscall_exit_to_user_mode+0x1c8/0x1e0\n      [<ffffffff81dd78d5>] do_syscall_64+0x85/0x150\n      [<ffffffff81e0012b>] entry_SYSCALL_64_after_hwframe+0x76/0x7e\n  ...\n\nThis issue can be consistently reproduced on three different servers:\n  * a 448-core server\n  * a 256-core server\n  * a 192-core server\n\n[Root Cause]\nSince multiple threads are created by the hackbench program (along with\nthe command argument 'thread'), a shared vma might be accessed by two or\nmore cores simultaneously. When two or more cores observe that\nvma->numab_state is NULL at the same time, vma->numab_state will be\noverwritten.\n\nAlthough current code ensures that only one thread scans the VMAs in a\nsingle 'numa_scan_period', there might be a chance for another thread\nto enter in the next 'numa_scan_period' while we have not gotten till\nnumab_state allocation [1].\n\nNote that the command `/opt/ltp/testcases/bin/hackbench 50 process 1000`\ncannot the reproduce the issue. It is verified with 200+ test runs.\n\n[Solution]\nUse the cmpxchg atomic operation to ensure that only one thread executes\nthe vma->numab_state assignment.\n\n[1] https://lore.kernel.org/lkml/1794be3c-358c-4cdc-a43d-a1f841d91ef7@amd.com/(CVE-2024-56613)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nnilfs2: fix potential out-of-bounds memory access in nilfs_find_entry()\n\nSyzbot reported that when searching for records in a directory where the\ninode's i_size is corrupted and has a large value, memory access outside\nthe folio/page range may occur, or a use-after-free bug may be detected if\nKASAN is enabled.\n\nThis is because nilfs_last_byte(), which is called by nilfs_find_entry()\nand others to calculate the number of valid bytes of directory data in a\npage from i_size and the page index, loses the upper 32 bits of the 64-bit\nsize information due to an inappropriate type of local variable to which\nthe i_size value is assigned.\n\nThis caused a large byte offset value due to underflow in the end address\ncalculation in the calling nilfs_find_entry(), resulting in memory access\nthat exceeds the folio/page size.\n\nFix this issue by changing the type of the local variable causing the bit\nloss from \"unsigned int\" to \"u64\".  The return value of nilfs_last_byte()\nis also of type \"unsigned int\", but it is truncated so as not to exceed\nPAGE_SIZE and no bit loss occurs, so no change is required.(CVE-2024-56619)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nscsi: ufs: core: sysfs: Prevent div by zero\n\nPrevent a division by 0 when monitoring is not enabled.(CVE-2024-56622)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nksmbd: fix Out-of-Bounds Write in ksmbd_vfs_stream_write\n\nAn offset from client could be a negative value, It could allows\nto write data outside the bounds of the allocated buffer.\nNote that this issue is coming when setting\n'vfs objects = streams_xattr parameter' in ksmbd.conf..(CVE-2024-56626)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nscsi: sg: Fix slab-use-after-free read in sg_release()\n\nFix a use-after-free bug in sg_release(), detected by syzbot with KASAN:\n\nBUG: KASAN: slab-use-after-free in lock_release+0x151/0xa30\nkernel/locking/lockdep.c:5838\n__mutex_unlock_slowpath+0xe2/0x750 kernel/locking/mutex.c:912\nsg_release+0x1f4/0x2e0 drivers/scsi/sg.c:407\n\nIn sg_release(), the function kref_put(&sfp->f_ref, sg_remove_sfp) is\ncalled before releasing the open_rel_lock mutex. The kref_put() call may\ndecrement the reference count of sfp to zero, triggering its cleanup\nthrough sg_remove_sfp(). This cleanup includes scheduling deferred work\nvia sg_remove_sfp_usercontext(), which ultimately frees sfp.\n\nAfter kref_put(), sg_release() continues to unlock open_rel_lock and may\nreference sfp or sdp. If sfp has already been freed, this results in a\nslab-use-after-free error.\n\nMove the kref_put(&sfp->f_ref, sg_remove_sfp) call after unlocking the\nopen_rel_lock mutex. This ensures:\n\n - No references to sfp or sdp occur after the reference count is\n   decremented.\n\n - Cleanup functions such as sg_remove_sfp() and\n   sg_remove_sfp_usercontext() can safely execute without impacting the\n   mutex handling in sg_release().\n\nThe fix has been tested and validated by syzbot. This patch closes the\nbug reported at the following syzkaller link and ensures proper\nsequencing of resource cleanup and mutex operations, eliminating the\nrisk of use-after-free errors in sg_release().(CVE-2024-56631)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\ntcp_bpf: Fix the sk_mem_uncharge logic in tcp_bpf_sendmsg\n\nThe current sk memory accounting logic in __SK_REDIRECT is pre-uncharging\ntosend bytes, which is either msg->sg.size or a smaller value apply_bytes.\n\nPotential problems with this strategy are as follows:\n\n- If the actual sent bytes are smaller than tosend, we need to charge some\n  bytes back, as in line 487, which is okay but seems not clean.\n\n- When tosend is set to apply_bytes, as in line 417, and (ret < 0), we may\n  miss uncharging (msg->sg.size - apply_bytes) bytes.\n\n[...]\n415 tosend = msg->sg.size;\n416 if (psock->apply_bytes && psock->apply_bytes < tosend)\n417   tosend = psock->apply_bytes;\n[...]\n443 sk_msg_return(sk, msg, tosend);\n444 release_sock(sk);\n446 origsize = msg->sg.size;\n447 ret = tcp_bpf_sendmsg_redir(sk_redir, redir_ingress,\n448                             msg, tosend, flags);\n449 sent = origsize - msg->sg.size;\n[...]\n454 lock_sock(sk);\n455 if (unlikely(ret < 0)) {\n456   int free = sk_msg_free_nocharge(sk, msg);\n458   if (!cork)\n459     *copied -= free;\n460 }\n[...]\n487 if (eval == __SK_REDIRECT)\n488   sk_mem_charge(sk, tosend - sent);\n[...]\n\nWhen running the selftest test_txmsg_redir_wait_sndmem with txmsg_apply,\nthe following warning will be reported:\n\n------------[ cut here ]------------\nWARNING: CPU: 6 PID: 57 at net/ipv4/af_inet.c:156 inet_sock_destruct+0x190/0x1a0\nModules linked in:\nCPU: 6 UID: 0 PID: 57 Comm: kworker/6:0 Not tainted 6.12.0-rc1.bm.1-amd64+ #43\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014\nWorkqueue: events sk_psock_destroy\nRIP: 0010:inet_sock_destruct+0x190/0x1a0\nRSP: 0018:ffffad0a8021fe08 EFLAGS: 00010206\nRAX: 0000000000000011 RBX: ffff9aab4475b900 RCX: ffff9aab481a0800\nRDX: 0000000000000303 RSI: 0000000000000011 RDI: ffff9aab4475b900\nRBP: ffff9aab4475b990 R08: 0000000000000000 R09: ffff9aab40050ec0\nR10: 0000000000000000 R11: ffff9aae6fdb1d01 R12: ffff9aab49c60400\nR13: ffff9aab49c60598 R14: ffff9aab49c60598 R15: dead000000000100\nFS:  0000000000000000(0000) GS:ffff9aae6fd80000(0000) knlGS:0000000000000000\nCS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00007ffec7e47bd8 CR3: 00000001a1a1c004 CR4: 0000000000770ef0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nPKRU: 55555554\nCall Trace:\n<TASK>\n? __warn+0x89/0x130\n? inet_sock_destruct+0x190/0x1a0\n? report_bug+0xfc/0x1e0\n? handle_bug+0x5c/0xa0\n? exc_invalid_op+0x17/0x70\n? asm_exc_invalid_op+0x1a/0x20\n? inet_sock_destruct+0x190/0x1a0\n__sk_destruct+0x25/0x220\nsk_psock_destroy+0x2b2/0x310\nprocess_scheduled_works+0xa3/0x3e0\nworker_thread+0x117/0x240\n? __pfx_worker_thread+0x10/0x10\nkthread+0xcf/0x100\n? __pfx_kthread+0x10/0x10\nret_from_fork+0x31/0x40\n? __pfx_kthread+0x10/0x10\nret_from_fork_asm+0x1a/0x30\n</TASK>\n---[ end trace 0000000000000000 ]---\n\nIn __SK_REDIRECT, a more concise way is delaying the uncharging after sent\nbytes are finalized, and uncharge this value. When (ret < 0), we shall\ninvoke sk_msg_free.\n\nSame thing happens in case __SK_DROP, when tosend is set to apply_bytes,\nwe may miss uncharging (msg->sg.size - apply_bytes) bytes. The same\nwarning will be reported in selftest.\n\n[...]\n468 case __SK_DROP:\n469 default:\n470 sk_msg_free_partial(sk, msg, tosend);\n471 sk_msg_apply_bytes(psock, tosend);\n472 *copied -= (tosend + delta);\n473 return -EACCES;\n[...]\n\nSo instead of sk_msg_free_partial we can do sk_msg_free here.(CVE-2024-56633)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nft_inner: incorrect percpu area handling under softirq\n\nSoftirq can interrupt ongoing packet from process context that is\nwalking over the percpu area that contains inner header offsets.\n\nDisable bh and perform three checks before restoring the percpu inner\nheader offsets to validate that the percpu area is valid for this\nskbuff:\n\n1) If the NFT_PKTINFO_INNER_FULL flag is set on, then this skbuff\n   has already been parsed before for inner header fetching to\n   register.\n\n2) Validate that the percpu area refers to this skbuff using the\n   skbuff pointer as a cookie. If there is a cookie mismatch, then\n   this skbuff needs to be parsed again.\n\n3) Finally, validate if the percpu area refers to this tunnel type.\n\nOnly after these three checks the percpu area is restored to a on-stack\ncopy and bh is enabled again.\n\nAfter inner header fetching, the on-stack copy is stored back to the\npercpu area.(CVE-2024-56638)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nnet: enetc: Do not configure preemptible TCs if SIs do not support\n\nBoth ENETC PF and VF drivers share enetc_setup_tc_mqprio() to configure\nMQPRIO. And enetc_setup_tc_mqprio() calls enetc_change_preemptible_tcs()\nto configure preemptible TCs. However, only PF is able to configure\npreemptible TCs. Because only PF has related registers, while VF does not\nhave these registers. So for VF, its hw->port pointer is NULL. Therefore,\nVF will access an invalid pointer when accessing a non-existent register,\nwhich will cause a crash issue. The simplified log is as follows.\n\nroot@ls1028ardb:~# tc qdisc add dev eno0vf0 parent root handle 100: \\\nmqprio num_tc 4 map 0 0 1 1 2 2 3 3 queues 1@0 1@1 1@2 1@3 hw 1\n[  187.290775] Unable to handle kernel paging request at virtual address 0000000000001f00\n[  187.424831] pc : enetc_mm_commit_preemptible_tcs+0x1c4/0x400\n[  187.430518] lr : enetc_mm_commit_preemptible_tcs+0x30c/0x400\n[  187.511140] Call trace:\n[  187.513588]  enetc_mm_commit_preemptible_tcs+0x1c4/0x400\n[  187.518918]  enetc_setup_tc_mqprio+0x180/0x214\n[  187.523374]  enetc_vf_setup_tc+0x1c/0x30\n[  187.527306]  mqprio_enable_offload+0x144/0x178\n[  187.531766]  mqprio_init+0x3ec/0x668\n[  187.535351]  qdisc_create+0x15c/0x488\n[  187.539023]  tc_modify_qdisc+0x398/0x73c\n[  187.542958]  rtnetlink_rcv_msg+0x128/0x378\n[  187.547064]  netlink_rcv_skb+0x60/0x130\n[  187.550910]  rtnetlink_rcv+0x18/0x24\n[  187.554492]  netlink_unicast+0x300/0x36c\n[  187.558425]  netlink_sendmsg+0x1a8/0x420\n[  187.606759] ---[ end trace 0000000000000000 ]---\n\nIn addition, some PFs also do not support configuring preemptible TCs,\nsuch as eno1 and eno3 on LS1028A. It won't crash like it does for VFs,\nbut we should prevent these PFs from accessing these unimplemented\nregisters.(CVE-2024-56649)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: hci_event: Fix using rcu_read_(un)lock while iterating\n\nThe usage of rcu_read_(un)lock while inside list_for_each_entry_rcu is\nnot safe since for the most part entries fetched this way shall be\ntreated as rcu_dereference:\n\n\tNote that the value returned by rcu_dereference() is valid\n\tonly within the enclosing RCU read-side critical section [1]_.\n\tFor example, the following is **not** legal::\n\n\t\trcu_read_lock();\n\t\tp = rcu_dereference(head.next);\n\t\trcu_read_unlock();\n\t\tx = p->address;\t/* BUG!!! */\n\t\trcu_read_lock();\n\t\ty = p->data;\t/* BUG!!! */\n\t\trcu_read_unlock();(CVE-2024-56654)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx5: DR, prevent potential error pointer dereference\n\nThe dr_domain_add_vport_cap() function generally returns NULL on error\nbut sometimes we want it to return ERR_PTR(-EBUSY) so the caller can\nretry.  The problem here is that \"ret\" can be either -EBUSY or -ENOMEM\nand if it's and -ENOMEM then the error pointer is propogated back and\neventually dereferenced in dr_ste_v0_build_src_gvmi_qpn_tag().(CVE-2024-56660)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nacpi: nfit: vmalloc-out-of-bounds Read in acpi_nfit_ctl\n\nFix an issue detected by syzbot with KASAN:\n\nBUG: KASAN: vmalloc-out-of-bounds in cmd_to_func drivers/acpi/nfit/\ncore.c:416 [inline]\nBUG: KASAN: vmalloc-out-of-bounds in acpi_nfit_ctl+0x20e8/0x24a0\ndrivers/acpi/nfit/core.c:459\n\nThe issue occurs in cmd_to_func when the call_pkg->nd_reserved2\narray is accessed without verifying that call_pkg points to a buffer\nthat is appropriately sized as a struct nd_cmd_pkg. This can lead\nto out-of-bounds access and undefined behavior if the buffer does not\nhave sufficient space.\n\nTo address this, a check was added in acpi_nfit_ctl() to ensure that\nbuf is not NULL and that buf_len is less than sizeof(*call_pkg)\nbefore accessing it. This ensures safe access to the members of\ncall_pkg, including the nd_reserved2 array.(CVE-2024-56662)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nwifi: nl80211: fix NL80211_ATTR_MLO_LINK_ID off-by-one\n\nSince the netlink attribute range validation provides inclusive\nchecking, the *max* of attribute NL80211_ATTR_MLO_LINK_ID should be\nIEEE80211_MLD_MAX_NUM_LINKS - 1 otherwise causing an off-by-one.\n\nOne crash stack for demonstration:\n==================================================================\nBUG: KASAN: wild-memory-access in ieee80211_tx_control_port+0x3b6/0xca0 net/mac80211/tx.c:5939\nRead of size 6 at addr 001102080000000c by task fuzzer.386/9508\n\nCPU: 1 PID: 9508 Comm: syz.1.386 Not tainted 6.1.70 #2\nCall Trace:\n <TASK>\n __dump_stack lib/dump_stack.c:88 [inline]\n dump_stack_lvl+0x177/0x231 lib/dump_stack.c:106\n print_report+0xe0/0x750 mm/kasan/report.c:398\n kasan_report+0x139/0x170 mm/kasan/report.c:495\n kasan_check_range+0x287/0x290 mm/kasan/generic.c:189\n memcpy+0x25/0x60 mm/kasan/shadow.c:65\n ieee80211_tx_control_port+0x3b6/0xca0 net/mac80211/tx.c:5939\n rdev_tx_control_port net/wireless/rdev-ops.h:761 [inline]\n nl80211_tx_control_port+0x7b3/0xc40 net/wireless/nl80211.c:15453\n genl_family_rcv_msg_doit+0x22e/0x320 net/netlink/genetlink.c:756\n genl_family_rcv_msg net/netlink/genetlink.c:833 [inline]\n genl_rcv_msg+0x539/0x740 net/netlink/genetlink.c:850\n netlink_rcv_skb+0x1de/0x420 net/netlink/af_netlink.c:2508\n genl_rcv+0x24/0x40 net/netlink/genetlink.c:861\n netlink_unicast_kernel net/netlink/af_netlink.c:1326 [inline]\n netlink_unicast+0x74b/0x8c0 net/netlink/af_netlink.c:1352\n netlink_sendmsg+0x882/0xb90 net/netlink/af_netlink.c:1874\n sock_sendmsg_nosec net/socket.c:716 [inline]\n __sock_sendmsg net/socket.c:728 [inline]\n ____sys_sendmsg+0x5cc/0x8f0 net/socket.c:2499\n ___sys_sendmsg+0x21c/0x290 net/socket.c:2553\n __sys_sendmsg net/socket.c:2582 [inline]\n __do_sys_sendmsg net/socket.c:2591 [inline]\n __se_sys_sendmsg+0x19e/0x270 net/socket.c:2589\n do_syscall_x64 arch/x86/entry/common.c:51 [inline]\n do_syscall_64+0x45/0x90 arch/x86/entry/common.c:81\n entry_SYSCALL_64_after_hwframe+0x63/0xcd\n\nUpdate the policy to ensure correct validation.(CVE-2024-56663)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\ndrm/i915: Fix NULL pointer dereference in capture_engine\n\nWhen the intel_context structure contains NULL,\nit raises a NULL pointer dereference error in drm_info().\n\n(cherry picked from commit 754302a5bc1bd8fd3b7d85c168b0a1af6d4bba4d)(CVE-2024-56667)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nblk-cgroup: Fix UAF in blkcg_unpin_online()\n\nblkcg_unpin_online() walks up the blkcg hierarchy putting the online pin. To\nwalk up, it uses blkcg_parent(blkcg) but it was calling that after\nblkcg_destroy_blkgs(blkcg) which could free the blkcg, leading to the\nfollowing UAF:\n\n  ==================================================================\n  BUG: KASAN: slab-use-after-free in blkcg_unpin_online+0x15a/0x270\n  Read of size 8 at addr ffff8881057678c0 by task kworker/9:1/117\n\n  CPU: 9 UID: 0 PID: 117 Comm: kworker/9:1 Not tainted 6.13.0-rc1-work-00182-gb8f52214c61a-dirty #48\n  Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS unknown 02/02/2022\n  Workqueue: cgwb_release cgwb_release_workfn\n  Call Trace:\n   <TASK>\n   dump_stack_lvl+0x27/0x80\n   print_report+0x151/0x710\n   kasan_report+0xc0/0x100\n   blkcg_unpin_online+0x15a/0x270\n   cgwb_release_workfn+0x194/0x480\n   process_scheduled_works+0x71b/0xe20\n   worker_thread+0x82a/0xbd0\n   kthread+0x242/0x2c0\n   ret_from_fork+0x33/0x70\n   ret_from_fork_asm+0x1a/0x30\n   </TASK>\n  ...\n  Freed by task 1944:\n   kasan_save_track+0x2b/0x70\n   kasan_save_free_info+0x3c/0x50\n   __kasan_slab_free+0x33/0x50\n   kfree+0x10c/0x330\n   css_free_rwork_fn+0xe6/0xb30\n   process_scheduled_works+0x71b/0xe20\n   worker_thread+0x82a/0xbd0\n   kthread+0x242/0x2c0\n   ret_from_fork+0x33/0x70\n   ret_from_fork_asm+0x1a/0x30\n\nNote that the UAF is not easy to trigger as the free path is indirected\nbehind a couple RCU grace periods and a work item execution. I could only\ntrigger it with artifical msleep() injected in blkcg_unpin_online().\n\nFix it by reading the parent pointer before destroying the blkcg's blkg's.(CVE-2024-56672)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nocteontx2-pf: handle otx2_mbox_get_rsp errors in otx2_common.c\n\nAdd error pointer check after calling otx2_mbox_get_rsp().(CVE-2024-56679)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nmfd: intel_soc_pmic_bxtwc: Use IRQ domain for USB Type-C device\n\nWhile design wise the idea of converting the driver to use\nthe hierarchy of the IRQ chips is correct, the implementation\nhas (inherited) flaws. This was unveiled when platform_get_irq()\nhad started WARN() on IRQ 0 that is supposed to be a Linux\nIRQ number (also known as vIRQ).\n\nRework the driver to respect IRQ domain when creating each MFD\ndevice separately, as the domain is not the same for all of them.(CVE-2024-56691)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nbpf, sockmap: Several fixes to bpf_msg_pop_data\n\nSeveral fixes to bpf_msg_pop_data,\n1. In sk_msg_shift_left, we should put_page\n2. if (len == 0), return early is better\n3. pop the entire sk_msg (last == msg->sg.size) should be supported\n4. Fix for the value of variable \"a\"\n5. In sk_msg_shift_left, after shifting, i has already pointed to the next\nelement. Addtional sk_msg_iter_var_next may result in BUG.(CVE-2024-56720)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nocteontx2-pf: handle otx2_mbox_get_rsp errors in cn10k.c\n\nAdd error pointer check after calling otx2_mbox_get_rsp().(CVE-2024-56726)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nrtc: check if __rtc_read_time was successful in rtc_timer_do_work()\n\nIf the __rtc_read_time call fails,, the struct rtc_time tm; may contain\nuninitialized data, or an illegal date/time read from the RTC hardware.\n\nWhen calling rtc_tm_to_ktime later, the result may be a very large value\n(possibly KTIME_MAX). If there are periodic timers in rtc->timerqueue,\nthey will continually expire, may causing kernel softlockup.(CVE-2024-56739)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nvfio/mlx5: Fix an unwind issue in mlx5vf_add_migration_pages()\n\nFix an unwind issue in mlx5vf_add_migration_pages().\n\nIf a set of pages is allocated but fails to be added to the SG table,\nthey need to be freed to prevent a memory leak.\n\nAny pages successfully added to the SG table will be freed as part of\nmlx5vf_free_data_buffer().(CVE-2024-56742)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nPCI: Fix reset_method_store() memory leak\n\nIn reset_method_store(), a string is allocated via kstrndup() and assigned\nto the local \"options\". options is then used in with strsep() to find\nspaces:\n\n  while ((name = strsep(&options, \" \")) != NULL) {\n\nIf there are no remaining spaces, then options is set to NULL by strsep(),\nso the subsequent kfree(options) doesn't free the memory allocated via\nkstrndup().\n\nFix by using a separate tmp_options to iterate with strsep() so options is\npreserved.(CVE-2024-56745)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nscsi: qedi: Fix a possible memory leak in qedi_alloc_and_init_sb()\n\nHook \"qedi_ops->common->sb_init = qed_sb_init\" does not release the DMA\nmemory sb_virt when it fails. Add dma_free_coherent() to free it. This\nis the same way as qedr_alloc_mem_sb() and qede_alloc_mem_sb().(CVE-2024-56747)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nnetfs/fscache: Add a memory barrier for FSCACHE_VOLUME_CREATING\n\nIn fscache_create_volume(), there is a missing memory barrier between the\nbit-clearing operation and the wake-up operation. This may cause a\nsituation where, after a wake-up, the bit-clearing operation hasn't been\ndetected yet, leading to an indefinite wait. The triggering process is as\nfollows:\n\n  [cookie1]                [cookie2]                  [volume_work]\nfscache_perform_lookup\n  fscache_create_volume\n                        fscache_perform_lookup\n                          fscache_create_volume\n\t\t\t                        fscache_create_volume_work\n                                                  cachefiles_acquire_volume\n                                                  clear_and_wake_up_bit\n    test_and_set_bit\n                            test_and_set_bit\n                              goto maybe_wait\n      goto no_wait\n\nIn the above process, cookie1 and cookie2 has the same volume. When cookie1\nenters the -no_wait- process, it will clear the bit and wake up the waiting\nprocess. If a barrier is missing, it may cause cookie2 to remain in the\n-wait- process indefinitely.\n\nIn commit 3288666c7256 (\"fscache: Use clear_and_wake_up_bit() in\nfscache_create_volume_work()\"), barriers were added to similar operations\nin fscache_create_volume_work(), but fscache_create_volume() was missed.\n\nBy combining the clear and wake operations into clear_and_wake_up_bit() to\nfix this issue.(CVE-2024-56755)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nnvme-pci: fix freeing of the HMB descriptor table\n\nThe HMB descriptor table is sized to the maximum number of descriptors\nthat could be used for a given device, but __nvme_alloc_host_mem could\nbreak out of the loop earlier on memory allocation failure and end up\nusing less descriptors than planned for, which leads to an incorrect\nsize passed to dma_free_coherent.\n\nIn practice this was not showing up because the number of descriptors\ntends to be low and the dma coherent allocator always allocates and\nfrees at least a page.(CVE-2024-56756)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: fix use-after-free when COWing tree bock and tracing is enabled\n\nWhen a COWing a tree block, at btrfs_cow_block(), and we have the\ntracepoint trace_btrfs_cow_block() enabled and preemption is also enabled\n(CONFIG_PREEMPT=y), we can trigger a use-after-free in the COWed extent\nbuffer while inside the tracepoint code. This is because in some paths\nthat call btrfs_cow_block(), such as btrfs_search_slot(), we are holding\nthe last reference on the extent buffer @buf so btrfs_force_cow_block()\ndrops the last reference on the @buf extent buffer when it calls\nfree_extent_buffer_stale(buf), which schedules the release of the extent\nbuffer with RCU. This means that if we are on a kernel with preemption,\nthe current task may be preempted before calling trace_btrfs_cow_block()\nand the extent buffer already released by the time trace_btrfs_cow_block()\nis called, resulting in a use-after-free.\n\nFix this by moving the trace_btrfs_cow_block() from btrfs_cow_block() to\nbtrfs_force_cow_block() before the COWed extent buffer is freed.\nThis also has a side effect of invoking the tracepoint in the tree defrag\ncode, at defrag.c:btrfs_realloc_node(), since btrfs_force_cow_block() is\ncalled there, but this is fine and it was actually missing there.(CVE-2024-56759)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\ntracing: Prevent bad count for tracing_cpumask_write\n\nIf a large count is provided, it will trigger a warning in bitmap_parse_user.\nAlso check zero for it.(CVE-2024-56763)",
				"category":"general",
				"title":"Description"
			},
			{
				"text":"An update for kernel is now available for openEuler-24.03-LTS.\n\nopenEuler Security has rated this update as having a security impact of high. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.",
				"category":"general",
				"title":"Topic"
			},
			{
				"text":"High",
				"category":"general",
				"title":"Severity"
			},
			{
				"text":"kernel",
				"category":"general",
				"title":"Affected Component"
			}
		],
		"publisher":{
			"issuing_authority":"openEuler security committee",
			"name":"openEuler",
			"namespace":"https://www.openeuler.org",
			"contact_details":"openeuler-security@openeuler.org",
			"category":"vendor"
		},
		"references":[
			{
				"summary":"openEuler-SA-2025-1078",
				"category":"self",
				"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1078"
			},
			{
				"summary":"CVE-2023-52887",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2023-52887&packageName=kernel"
			},
			{
				"summary":"CVE-2024-36013",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-36013&packageName=kernel"
			},
			{
				"summary":"CVE-2024-36021",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-36021&packageName=kernel"
			},
			{
				"summary":"CVE-2024-38540",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-38540&packageName=kernel"
			},
			{
				"summary":"CVE-2024-38547",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-38547&packageName=kernel"
			},
			{
				"summary":"CVE-2024-39292",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-39292&packageName=kernel"
			},
			{
				"summary":"CVE-2024-39497",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-39497&packageName=kernel"
			},
			{
				"summary":"CVE-2024-40942",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-40942&packageName=kernel"
			},
			{
				"summary":"CVE-2024-41017",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-41017&packageName=kernel"
			},
			{
				"summary":"CVE-2024-41022",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-41022&packageName=kernel"
			},
			{
				"summary":"CVE-2024-41027",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-41027&packageName=kernel"
			},
			{
				"summary":"CVE-2024-41034",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-41034&packageName=kernel"
			},
			{
				"summary":"CVE-2024-41055",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-41055&packageName=kernel"
			},
			{
				"summary":"CVE-2024-41065",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-41065&packageName=kernel"
			},
			{
				"summary":"CVE-2024-41070",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-41070&packageName=kernel"
			},
			{
				"summary":"CVE-2024-41078",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-41078&packageName=kernel"
			},
			{
				"summary":"CVE-2024-41081",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-41081&packageName=kernel"
			},
			{
				"summary":"CVE-2024-41089",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-41089&packageName=kernel"
			},
			{
				"summary":"CVE-2024-41095",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-41095&packageName=kernel"
			},
			{
				"summary":"CVE-2024-41097",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-41097&packageName=kernel"
			},
			{
				"summary":"CVE-2024-42076",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-42076&packageName=kernel"
			},
			{
				"summary":"CVE-2024-42077",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-42077&packageName=kernel"
			},
			{
				"summary":"CVE-2024-42080",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-42080&packageName=kernel"
			},
			{
				"summary":"CVE-2024-42082",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-42082&packageName=kernel"
			},
			{
				"summary":"CVE-2024-42084",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-42084&packageName=kernel"
			},
			{
				"summary":"CVE-2024-42087",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-42087&packageName=kernel"
			},
			{
				"summary":"CVE-2024-42089",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-42089&packageName=kernel"
			},
			{
				"summary":"CVE-2024-42090",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-42090&packageName=kernel"
			},
			{
				"summary":"CVE-2024-42092",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-42092&packageName=kernel"
			},
			{
				"summary":"CVE-2024-42093",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-42093&packageName=kernel"
			},
			{
				"summary":"CVE-2024-42094",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-42094&packageName=kernel"
			},
			{
				"summary":"CVE-2024-42095",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-42095&packageName=kernel"
			},
			{
				"summary":"CVE-2024-42096",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-42096&packageName=kernel"
			},
			{
				"summary":"CVE-2024-42098",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-42098&packageName=kernel"
			},
			{
				"summary":"CVE-2024-42106",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-42106&packageName=kernel"
			},
			{
				"summary":"CVE-2024-42119",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-42119&packageName=kernel"
			},
			{
				"summary":"CVE-2024-42124",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-42124&packageName=kernel"
			},
			{
				"summary":"CVE-2024-42137",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-42137&packageName=kernel"
			},
			{
				"summary":"CVE-2024-42143",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-42143&packageName=kernel"
			},
			{
				"summary":"CVE-2024-42145",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-42145&packageName=kernel"
			},
			{
				"summary":"CVE-2024-42148",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-42148&packageName=kernel"
			},
			{
				"summary":"CVE-2024-42244",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-42244&packageName=kernel"
			},
			{
				"summary":"CVE-2024-42246",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-42246&packageName=kernel"
			},
			{
				"summary":"CVE-2024-42281",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-42281&packageName=kernel"
			},
			{
				"summary":"CVE-2024-42288",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-42288&packageName=kernel"
			},
			{
				"summary":"CVE-2024-42304",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-42304&packageName=kernel"
			},
			{
				"summary":"CVE-2024-42310",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-42310&packageName=kernel"
			},
			{
				"summary":"CVE-2024-42318",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-42318&packageName=kernel"
			},
			{
				"summary":"CVE-2024-43839",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-43839&packageName=kernel"
			},
			{
				"summary":"CVE-2024-43854",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-43854&packageName=kernel"
			},
			{
				"summary":"CVE-2024-43879",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-43879&packageName=kernel"
			},
			{
				"summary":"CVE-2024-44944",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-44944&packageName=kernel"
			},
			{
				"summary":"CVE-2024-45006",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-45006&packageName=kernel"
			},
			{
				"summary":"CVE-2024-46707",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-46707&packageName=kernel"
			},
			{
				"summary":"CVE-2024-46770",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-46770&packageName=kernel"
			},
			{
				"summary":"CVE-2024-46828",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-46828&packageName=kernel"
			},
			{
				"summary":"CVE-2024-46848",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-46848&packageName=kernel"
			},
			{
				"summary":"CVE-2024-47670",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-47670&packageName=kernel"
			},
			{
				"summary":"CVE-2024-49938",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-49938&packageName=kernel"
			},
			{
				"summary":"CVE-2024-49944",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-49944&packageName=kernel"
			},
			{
				"summary":"CVE-2024-49952",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-49952&packageName=kernel"
			},
			{
				"summary":"CVE-2024-49959",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-49959&packageName=kernel"
			},
			{
				"summary":"CVE-2024-49963",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-49963&packageName=kernel"
			},
			{
				"summary":"CVE-2024-50073",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-50073&packageName=kernel"
			},
			{
				"summary":"CVE-2024-50133",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-50133&packageName=kernel"
			},
			{
				"summary":"CVE-2024-50142",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-50142&packageName=kernel"
			},
			{
				"summary":"CVE-2024-50167",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-50167&packageName=kernel"
			},
			{
				"summary":"CVE-2024-50168",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-50168&packageName=kernel"
			},
			{
				"summary":"CVE-2024-50251",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-50251&packageName=kernel"
			},
			{
				"summary":"CVE-2024-53050",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-53050&packageName=kernel"
			},
			{
				"summary":"CVE-2024-53099",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-53099&packageName=kernel"
			},
			{
				"summary":"CVE-2024-53101",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-53101&packageName=kernel"
			},
			{
				"summary":"CVE-2024-53128",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-53128&packageName=kernel"
			},
			{
				"summary":"CVE-2024-53150",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-53150&packageName=kernel"
			},
			{
				"summary":"CVE-2024-53155",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-53155&packageName=kernel"
			},
			{
				"summary":"CVE-2024-53157",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-53157&packageName=kernel"
			},
			{
				"summary":"CVE-2024-53158",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-53158&packageName=kernel"
			},
			{
				"summary":"CVE-2024-53159",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-53159&packageName=kernel"
			},
			{
				"summary":"CVE-2024-53160",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-53160&packageName=kernel"
			},
			{
				"summary":"CVE-2024-53171",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-53171&packageName=kernel"
			},
			{
				"summary":"CVE-2024-53180",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-53180&packageName=kernel"
			},
			{
				"summary":"CVE-2024-53187",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-53187&packageName=kernel"
			},
			{
				"summary":"CVE-2024-53190",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-53190&packageName=kernel"
			},
			{
				"summary":"CVE-2024-53191",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-53191&packageName=kernel"
			},
			{
				"summary":"CVE-2024-53194",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-53194&packageName=kernel"
			},
			{
				"summary":"CVE-2024-53196",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-53196&packageName=kernel"
			},
			{
				"summary":"CVE-2024-53203",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-53203&packageName=kernel"
			},
			{
				"summary":"CVE-2024-53213",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-53213&packageName=kernel"
			},
			{
				"summary":"CVE-2024-53215",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-53215&packageName=kernel"
			},
			{
				"summary":"CVE-2024-53218",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-53218&packageName=kernel"
			},
			{
				"summary":"CVE-2024-53219",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-53219&packageName=kernel"
			},
			{
				"summary":"CVE-2024-53224",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-53224&packageName=kernel"
			},
			{
				"summary":"CVE-2024-53226",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-53226&packageName=kernel"
			},
			{
				"summary":"CVE-2024-53229",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-53229&packageName=kernel"
			},
			{
				"summary":"CVE-2024-53231",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-53231&packageName=kernel"
			},
			{
				"summary":"CVE-2024-53234",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-53234&packageName=kernel"
			},
			{
				"summary":"CVE-2024-53239",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-53239&packageName=kernel"
			},
			{
				"summary":"CVE-2024-53241",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-53241&packageName=kernel"
			},
			{
				"summary":"CVE-2024-55639",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-55639&packageName=kernel"
			},
			{
				"summary":"CVE-2024-56543",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-56543&packageName=kernel"
			},
			{
				"summary":"CVE-2024-56546",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-56546&packageName=kernel"
			},
			{
				"summary":"CVE-2024-56549",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-56549&packageName=kernel"
			},
			{
				"summary":"CVE-2024-56562",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-56562&packageName=kernel"
			},
			{
				"summary":"CVE-2024-56570",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-56570&packageName=kernel"
			},
			{
				"summary":"CVE-2024-56572",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-56572&packageName=kernel"
			},
			{
				"summary":"CVE-2024-56582",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-56582&packageName=kernel"
			},
			{
				"summary":"CVE-2024-56583",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-56583&packageName=kernel"
			},
			{
				"summary":"CVE-2024-56585",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-56585&packageName=kernel"
			},
			{
				"summary":"CVE-2024-56586",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-56586&packageName=kernel"
			},
			{
				"summary":"CVE-2024-56592",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-56592&packageName=kernel"
			},
			{
				"summary":"CVE-2024-56594",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-56594&packageName=kernel"
			},
			{
				"summary":"CVE-2024-56595",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-56595&packageName=kernel"
			},
			{
				"summary":"CVE-2024-56596",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-56596&packageName=kernel"
			},
			{
				"summary":"CVE-2024-56597",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-56597&packageName=kernel"
			},
			{
				"summary":"CVE-2024-56605",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-56605&packageName=kernel"
			},
			{
				"summary":"CVE-2024-56609",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-56609&packageName=kernel"
			},
			{
				"summary":"CVE-2024-56613",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-56613&packageName=kernel"
			},
			{
				"summary":"CVE-2024-56619",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-56619&packageName=kernel"
			},
			{
				"summary":"CVE-2024-56622",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-56622&packageName=kernel"
			},
			{
				"summary":"CVE-2024-56626",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-56626&packageName=kernel"
			},
			{
				"summary":"CVE-2024-56631",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-56631&packageName=kernel"
			},
			{
				"summary":"CVE-2024-56633",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-56633&packageName=kernel"
			},
			{
				"summary":"CVE-2024-56638",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-56638&packageName=kernel"
			},
			{
				"summary":"CVE-2024-56649",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-56649&packageName=kernel"
			},
			{
				"summary":"CVE-2024-56654",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-56654&packageName=kernel"
			},
			{
				"summary":"CVE-2024-56660",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-56660&packageName=kernel"
			},
			{
				"summary":"CVE-2024-56662",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-56662&packageName=kernel"
			},
			{
				"summary":"CVE-2024-56663",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-56663&packageName=kernel"
			},
			{
				"summary":"CVE-2024-56667",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-56667&packageName=kernel"
			},
			{
				"summary":"CVE-2024-56672",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-56672&packageName=kernel"
			},
			{
				"summary":"CVE-2024-56679",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-56679&packageName=kernel"
			},
			{
				"summary":"CVE-2024-56691",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-56691&packageName=kernel"
			},
			{
				"summary":"CVE-2024-56720",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-56720&packageName=kernel"
			},
			{
				"summary":"CVE-2024-56726",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-56726&packageName=kernel"
			},
			{
				"summary":"CVE-2024-56739",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-56739&packageName=kernel"
			},
			{
				"summary":"CVE-2024-56742",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-56742&packageName=kernel"
			},
			{
				"summary":"CVE-2024-56745",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-56745&packageName=kernel"
			},
			{
				"summary":"CVE-2024-56747",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-56747&packageName=kernel"
			},
			{
				"summary":"CVE-2024-56755",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-56755&packageName=kernel"
			},
			{
				"summary":"CVE-2024-56756",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-56756&packageName=kernel"
			},
			{
				"summary":"CVE-2024-56759",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-56759&packageName=kernel"
			},
			{
				"summary":"CVE-2024-56763",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-56763&packageName=kernel"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52887"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-36013"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-36021"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-38540"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-38547"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-39292"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-39497"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-40942"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-41017"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-41022"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-41027"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-41034"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-41055"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-41065"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-41070"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-41078"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-41081"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-41089"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-41095"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-41097"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-42076"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-42077"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-42080"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-42082"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-42084"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-42087"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-42089"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-42090"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-42092"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-42093"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-42094"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-42095"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-42096"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-42098"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-42106"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-42119"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-42124"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-42137"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-42143"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-42145"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-42148"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-42244"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-42246"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-42281"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-42288"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-42304"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-42310"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-42318"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-43839"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-43854"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-43879"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-44944"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-45006"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-46707"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-46770"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-46828"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-46848"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-47670"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-49938"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-49944"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-49952"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-49959"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-49963"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50073"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50133"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50142"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50167"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50168"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50251"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-53050"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-53099"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-53101"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-53128"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-53150"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-53155"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-53157"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-53158"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-53159"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-53160"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-53171"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-53180"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-53187"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-53190"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-53191"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-53194"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-53196"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-53203"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-53213"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-53215"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-53218"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-53219"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-53224"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-53226"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-53229"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-53231"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-53234"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-53239"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-53241"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-55639"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-56543"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-56546"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-56549"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-56562"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-56570"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-56572"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-56582"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-56583"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-56585"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-56586"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-56592"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-56594"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-56595"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-56596"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-56597"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-56605"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-56609"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-56613"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-56619"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-56622"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-56626"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-56631"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-56633"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-56638"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-56649"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-56654"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-56660"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-56662"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-56663"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-56667"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-56672"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-56679"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-56691"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-56720"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-56726"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-56739"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-56742"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-56745"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-56747"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-56755"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-56756"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-56759"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-56763"
			},
			{
				"summary":"openEuler-SA-2025-1078 vex file",
				"category":"self",
				"url":"https://repo.openeuler.org/security/data/csaf/advisories/2025/csaf-openeuler-sa-2025-1078.json"
			}
		],
		"title":"An update for kernel is now available for openEuler-24.03-LTS",
		"tracking":{
			"initial_release_date":"2025-01-24T21:48:47+08:00",
			"revision_history":[
				{
					"date":"2025-01-24T21:48:47+08:00",
					"summary":"Initial",
					"number":"1.0.0"
				}
			],
			"generator":{
				"date":"2025-01-24T21:48:47+08:00",
				"engine":{
					"name":"openEuler CSAF Tool V1.0"
				}
			},
			"current_release_date":"2025-01-24T21:48:47+08:00",
			"id":"openEuler-SA-2025-1078",
			"version":"1.0.0",
			"status":"final"
		}
	},
	"product_tree":{
		"branches":[
			{
				"name":"openEuler",
				"category":"vendor",
				"branches":[
					{
						"name":"openEuler",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"openEuler-24.03-LTS",
									"name":"openEuler-24.03-LTS"
								},
								"name":"openEuler-24.03-LTS",
								"category":"product_version"
							}
						],
						"category":"product_name"
					},
					{
						"name":"src",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-6.6.0-75.0.0.68.oe2403.src.rpm",
									"name":"kernel-6.6.0-75.0.0.68.oe2403.src.rpm"
								},
								"name":"kernel-6.6.0-75.0.0.68.oe2403.src.rpm",
								"category":"product_version"
							}
						],
						"category":"architecture"
					},
					{
						"name":"aarch64",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"bpftool-6.6.0-75.0.0.68.oe2403.aarch64.rpm",
									"name":"bpftool-6.6.0-75.0.0.68.oe2403.aarch64.rpm"
								},
								"name":"bpftool-6.6.0-75.0.0.68.oe2403.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64.rpm",
									"name":"bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64.rpm"
								},
								"name":"bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-6.6.0-75.0.0.68.oe2403.aarch64.rpm",
									"name":"kernel-6.6.0-75.0.0.68.oe2403.aarch64.rpm"
								},
								"name":"kernel-6.6.0-75.0.0.68.oe2403.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64.rpm",
									"name":"kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64.rpm"
								},
								"name":"kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64.rpm",
									"name":"kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64.rpm"
								},
								"name":"kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64.rpm",
									"name":"kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64.rpm"
								},
								"name":"kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64.rpm",
									"name":"kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64.rpm"
								},
								"name":"kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-source-6.6.0-75.0.0.68.oe2403.aarch64.rpm",
									"name":"kernel-source-6.6.0-75.0.0.68.oe2403.aarch64.rpm"
								},
								"name":"kernel-source-6.6.0-75.0.0.68.oe2403.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64.rpm",
									"name":"kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64.rpm"
								},
								"name":"kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64.rpm",
									"name":"kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64.rpm"
								},
								"name":"kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64.rpm",
									"name":"kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64.rpm"
								},
								"name":"kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"perf-6.6.0-75.0.0.68.oe2403.aarch64.rpm",
									"name":"perf-6.6.0-75.0.0.68.oe2403.aarch64.rpm"
								},
								"name":"perf-6.6.0-75.0.0.68.oe2403.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64.rpm",
									"name":"perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64.rpm"
								},
								"name":"perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"python3-perf-6.6.0-75.0.0.68.oe2403.aarch64.rpm",
									"name":"python3-perf-6.6.0-75.0.0.68.oe2403.aarch64.rpm"
								},
								"name":"python3-perf-6.6.0-75.0.0.68.oe2403.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64.rpm",
									"name":"python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64.rpm"
								},
								"name":"python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64.rpm",
								"category":"product_version"
							}
						],
						"category":"architecture"
					},
					{
						"name":"x86_64",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"bpftool-6.6.0-75.0.0.68.oe2403.x86_64.rpm",
									"name":"bpftool-6.6.0-75.0.0.68.oe2403.x86_64.rpm"
								},
								"name":"bpftool-6.6.0-75.0.0.68.oe2403.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64.rpm",
									"name":"bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64.rpm"
								},
								"name":"bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-6.6.0-75.0.0.68.oe2403.x86_64.rpm",
									"name":"kernel-6.6.0-75.0.0.68.oe2403.x86_64.rpm"
								},
								"name":"kernel-6.6.0-75.0.0.68.oe2403.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64.rpm",
									"name":"kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64.rpm"
								},
								"name":"kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64.rpm",
									"name":"kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64.rpm"
								},
								"name":"kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64.rpm",
									"name":"kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64.rpm"
								},
								"name":"kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64.rpm",
									"name":"kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64.rpm"
								},
								"name":"kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-source-6.6.0-75.0.0.68.oe2403.x86_64.rpm",
									"name":"kernel-source-6.6.0-75.0.0.68.oe2403.x86_64.rpm"
								},
								"name":"kernel-source-6.6.0-75.0.0.68.oe2403.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64.rpm",
									"name":"kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64.rpm"
								},
								"name":"kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64.rpm",
									"name":"kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64.rpm"
								},
								"name":"kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64.rpm",
									"name":"kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64.rpm"
								},
								"name":"kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"perf-6.6.0-75.0.0.68.oe2403.x86_64.rpm",
									"name":"perf-6.6.0-75.0.0.68.oe2403.x86_64.rpm"
								},
								"name":"perf-6.6.0-75.0.0.68.oe2403.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64.rpm",
									"name":"perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64.rpm"
								},
								"name":"perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"python3-perf-6.6.0-75.0.0.68.oe2403.x86_64.rpm",
									"name":"python3-perf-6.6.0-75.0.0.68.oe2403.x86_64.rpm"
								},
								"name":"python3-perf-6.6.0-75.0.0.68.oe2403.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64.rpm",
									"name":"python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64.rpm"
								},
								"name":"python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64.rpm",
								"category":"product_version"
							}
						],
						"category":"architecture"
					}
				]
			}
		],
		"relationships":[
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-6.6.0-75.0.0.68.oe2403.src.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
					"name":"kernel-6.6.0-75.0.0.68.oe2403.src as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"bpftool-6.6.0-75.0.0.68.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
					"name":"bpftool-6.6.0-75.0.0.68.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"name":"bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-6.6.0-75.0.0.68.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
					"name":"kernel-6.6.0-75.0.0.68.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"name":"kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
					"name":"kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"name":"kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
					"name":"kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-source-6.6.0-75.0.0.68.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
					"name":"kernel-source-6.6.0-75.0.0.68.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
					"name":"kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"name":"kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"name":"kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"perf-6.6.0-75.0.0.68.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"name":"perf-6.6.0-75.0.0.68.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"name":"perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"python3-perf-6.6.0-75.0.0.68.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"name":"python3-perf-6.6.0-75.0.0.68.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"name":"python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"bpftool-6.6.0-75.0.0.68.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
					"name":"bpftool-6.6.0-75.0.0.68.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"name":"bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-6.6.0-75.0.0.68.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
					"name":"kernel-6.6.0-75.0.0.68.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"name":"kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
					"name":"kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"name":"kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
					"name":"kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-source-6.6.0-75.0.0.68.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
					"name":"kernel-source-6.6.0-75.0.0.68.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
					"name":"kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"name":"kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"name":"kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"perf-6.6.0-75.0.0.68.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"name":"perf-6.6.0-75.0.0.68.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"name":"perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"python3-perf-6.6.0-75.0.0.68.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"name":"python3-perf-6.6.0-75.0.0.68.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"name":"python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			}
		]
	},
	"vulnerabilities":[
		{
			"cve":"CVE-2023-52887",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nnet: can: j1939: enhanced error handling for tightly received RTS messages in xtp_rx_rts_session_new\n\nThis patch enhances error handling in scenarios with RTS (Request to\nSend) messages arriving closely. It replaces the less informative WARN_ON_ONCE\nbacktraces with a new error handling method. This provides clearer error\nmessages and allows for the early termination of problematic sessions.\nPreviously, sessions were only released at the end of j1939_xtp_rx_rts().\n\nPotentially this could be reproduced with something like:\ntestj1939 -r vcan0:0x80 &\nwhile true; do\n\t# send first RTS\n\tcansend vcan0 18EC8090#1014000303002301;\n\t# send second RTS\n\tcansend vcan0 18EC8090#1014000303002301;\n\t# send abort\n\tcansend vcan0 18EC8090#ff00000000002301;\ndone",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1078"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":4.6,
						"vectorString":"CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2023-52887"
		},
		{
			"cve":"CVE-2024-36013",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: L2CAP: Fix slab-use-after-free in l2cap_connect()\n\nExtend a critical section to prevent chan from early freeing.\nAlso make the l2cap_connect() return type void. Nothing is using the\nreturned value but it is ugly to return a potentially freed pointer.\nMaking it void will help with backports because earlier kernels did use\nthe return value. Now the compile will break for kernels where this\npatch is not a complete fix.\n\nCall stack summary:\n\n[use]\nl2cap_bredr_sig_cmd\n  l2cap_connect\n  ┌ mutex_lock(&conn->chan_lock);\n  │ chan = pchan->ops->new_connection(pchan); <- alloc chan\n  │ __l2cap_chan_add(conn, chan);\n  │   l2cap_chan_hold(chan);\n  │   list_add(&chan->list, &conn->chan_l);   ... (1)\n  └ mutex_unlock(&conn->chan_lock);\n    chan->conf_state              ... (4) <- use after free\n\n[free]\nl2cap_conn_del\n┌ mutex_lock(&conn->chan_lock);\n│ foreach chan in conn->chan_l:            ... (2)\n│   l2cap_chan_put(chan);\n│     l2cap_chan_destroy\n│       kfree(chan)               ... (3) <- chan freed\n└ mutex_unlock(&conn->chan_lock);\n\n==================================================================\nBUG: KASAN: slab-use-after-free in instrument_atomic_read\ninclude/linux/instrumented.h:68 [inline]\nBUG: KASAN: slab-use-after-free in _test_bit\ninclude/asm-generic/bitops/instrumented-non-atomic.h:141 [inline]\nBUG: KASAN: slab-use-after-free in l2cap_connect+0xa67/0x11a0\nnet/bluetooth/l2cap_core.c:4260\nRead of size 8 at addr ffff88810bf040a0 by task kworker/u3:1/311",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1078"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":6.8,
						"vectorString":"CVSS:3.1/AV:A/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-36013"
		},
		{
			"cve":"CVE-2024-36021",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nnet: hns3: fix kernel crash when devlink reload during pf initialization\n\nThe devlink reload process will access the hardware resources,\nbut the register operation is done before the hardware is initialized.\nSo, processing the devlink reload during initialization may lead to kernel\ncrash. This patch fixes this by taking devl_lock during initialization.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1078"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-36021"
		},
		{
			"cve":"CVE-2024-38540",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nbnxt_re: avoid shift undefined behavior in bnxt_qplib_alloc_init_hwq\n\nUndefined behavior is triggered when bnxt_qplib_alloc_init_hwq is called\nwith hwq_attr->aux_depth != 0 and hwq_attr->aux_stride == 0.\nIn that case, \"roundup_pow_of_two(hwq_attr->aux_stride)\" gets called.\nroundup_pow_of_two is documented as undefined for 0.\n\nFix it in the one caller that had this combination.\n\nThe undefined behavior was detected by UBSAN:\n  UBSAN: shift-out-of-bounds in ./include/linux/log2.h:57:13\n  shift exponent 64 is too large for 64-bit type 'long unsigned int'\n  CPU: 24 PID: 1075 Comm: (udev-worker) Not tainted 6.9.0-rc6+ #4\n  Hardware name: Abacus electric, s.r.o. - servis@abacus.cz Super Server/H12SSW-iN, BIOS 2.7 10/25/2023\n  Call Trace:\n   <TASK>\n   dump_stack_lvl+0x5d/0x80\n   ubsan_epilogue+0x5/0x30\n   __ubsan_handle_shift_out_of_bounds.cold+0x61/0xec\n   __roundup_pow_of_two+0x25/0x35 [bnxt_re]\n   bnxt_qplib_alloc_init_hwq+0xa1/0x470 [bnxt_re]\n   bnxt_qplib_create_qp+0x19e/0x840 [bnxt_re]\n   bnxt_re_create_qp+0x9b1/0xcd0 [bnxt_re]\n   ? srso_alias_return_thunk+0x5/0xfbef5\n   ? srso_alias_return_thunk+0x5/0xfbef5\n   ? __kmalloc+0x1b6/0x4f0\n   ? create_qp.part.0+0x128/0x1c0 [ib_core]\n   ? __pfx_bnxt_re_create_qp+0x10/0x10 [bnxt_re]\n   create_qp.part.0+0x128/0x1c0 [ib_core]\n   ib_create_qp_kernel+0x50/0xd0 [ib_core]\n   create_mad_qp+0x8e/0xe0 [ib_core]\n   ? __pfx_qp_event_handler+0x10/0x10 [ib_core]\n   ib_mad_init_device+0x2be/0x680 [ib_core]\n   add_client_context+0x10d/0x1a0 [ib_core]\n   enable_device_and_get+0xe0/0x1d0 [ib_core]\n   ib_register_device+0x53c/0x630 [ib_core]\n   ? srso_alias_return_thunk+0x5/0xfbef5\n   bnxt_re_probe+0xbd8/0xe50 [bnxt_re]\n   ? __pfx_bnxt_re_probe+0x10/0x10 [bnxt_re]\n   auxiliary_bus_probe+0x49/0x80\n   ? driver_sysfs_add+0x57/0xc0\n   really_probe+0xde/0x340\n   ? pm_runtime_barrier+0x54/0x90\n   ? __pfx___driver_attach+0x10/0x10\n   __driver_probe_device+0x78/0x110\n   driver_probe_device+0x1f/0xa0\n   __driver_attach+0xba/0x1c0\n   bus_for_each_dev+0x8f/0xe0\n   bus_add_driver+0x146/0x220\n   driver_register+0x72/0xd0\n   __auxiliary_driver_register+0x6e/0xd0\n   ? __pfx_bnxt_re_mod_init+0x10/0x10 [bnxt_re]\n   bnxt_re_mod_init+0x3e/0xff0 [bnxt_re]\n   ? __pfx_bnxt_re_mod_init+0x10/0x10 [bnxt_re]\n   do_one_initcall+0x5b/0x310\n   do_init_module+0x90/0x250\n   init_module_from_file+0x86/0xc0\n   idempotent_init_module+0x121/0x2b0\n   __x64_sys_finit_module+0x5e/0xb0\n   do_syscall_64+0x82/0x160\n   ? srso_alias_return_thunk+0x5/0xfbef5\n   ? syscall_exit_to_user_mode_prepare+0x149/0x170\n   ? srso_alias_return_thunk+0x5/0xfbef5\n   ? syscall_exit_to_user_mode+0x75/0x230\n   ? srso_alias_return_thunk+0x5/0xfbef5\n   ? do_syscall_64+0x8e/0x160\n   ? srso_alias_return_thunk+0x5/0xfbef5\n   ? __count_memcg_events+0x69/0x100\n   ? srso_alias_return_thunk+0x5/0xfbef5\n   ? count_memcg_events.constprop.0+0x1a/0x30\n   ? srso_alias_return_thunk+0x5/0xfbef5\n   ? handle_mm_fault+0x1f0/0x300\n   ? srso_alias_return_thunk+0x5/0xfbef5\n   ? do_user_addr_fault+0x34e/0x640\n   ? srso_alias_return_thunk+0x5/0xfbef5\n   ? srso_alias_return_thunk+0x5/0xfbef5\n   entry_SYSCALL_64_after_hwframe+0x76/0x7e\n  RIP: 0033:0x7f4e5132821d\n  Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d e3 db 0c 00 f7 d8 64 89 01 48\n  RSP: 002b:00007ffca9c906a8 EFLAGS: 00000246 ORIG_RAX: 0000000000000139\n  RAX: ffffffffffffffda RBX: 0000563ec8a8f130 RCX: 00007f4e5132821d\n  RDX: 0000000000000000 RSI: 00007f4e518fa07d RDI: 000000000000003b\n  RBP: 00007ffca9c90760 R08: 00007f4e513f6b20 R09: 00007ffca9c906f0\n  R10: 0000563ec8a8faa0 R11: 0000000000000246 R12: 00007f4e518fa07d\n  R13: 0000000000020000 R14: 0000563ec8409e90 R15: 0000563ec8a8fa60\n   </TASK>\n  ---[ end trace ]---",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1078"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":4.4,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-38540"
		},
		{
			"cve":"CVE-2024-38547",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: atomisp: ssh_css: Fix a null-pointer dereference in load_video_binaries\n\nThe allocation failure of mycs->yuv_scaler_binary in load_video_binaries()\nis followed with a dereference of mycs->yuv_scaler_binary after the\nfollowing call chain:\n\nsh_css_pipe_load_binaries()\n  |-> load_video_binaries(mycs->yuv_scaler_binary == NULL)\n  |\n  |-> sh_css_pipe_unload_binaries()\n        |-> unload_video_binaries()\n\nIn unload_video_binaries(), it calls to ia_css_binary_unload with argument\n&pipe->pipe_settings.video.yuv_scaler_binary[i], which refers to the\nsame memory slot as mycs->yuv_scaler_binary. Thus, a null-pointer\ndereference is triggered.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1078"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-38547"
		},
		{
			"cve":"CVE-2024-39292",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\num: Add winch to winch_handlers before registering winch IRQ\n\nRegistering a winch IRQ is racy, an interrupt may occur before the winch is\nadded to the winch_handlers list.\n\nIf that happens, register_winch_irq() adds to that list a winch that is\nscheduled to be (or has already been) freed, causing a panic later in\nwinch_cleanup().\n\nAvoid the race by adding the winch to the winch_handlers list before\nregistering the IRQ, and rolling back if um_request_irq() fails.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1078"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-39292"
		},
		{
			"cve":"CVE-2024-39497",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/shmem-helper: Fix BUG_ON() on mmap(PROT_WRITE, MAP_PRIVATE)\n\nLack of check for copy-on-write (COW) mapping in drm_gem_shmem_mmap\nallows users to call mmap with PROT_WRITE and MAP_PRIVATE flag\ncausing a kernel panic due to BUG_ON in vmf_insert_pfn_prot:\nBUG_ON((vma->vm_flags & VM_PFNMAP) && is_cow_mapping(vma->vm_flags));\n\nReturn -EINVAL early if COW mapping is detected.\n\nThis bug affects all drm drivers using default shmem helpers.\nIt can be reproduced by this simple example:\nvoid *ptr = mmap(0, size, PROT_WRITE, MAP_PRIVATE, fd, mmap_offset);\nptr[0] = 0;",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1078"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.7,
						"vectorString":"CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-39497"
		},
		{
			"cve":"CVE-2024-40942",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: mac80211: mesh: Fix leak of mesh_preq_queue objects\n\nThe hwmp code use objects of type mesh_preq_queue, added to a list in\nieee80211_if_mesh, to keep track of mpath we need to resolve. If the mpath\ngets deleted, ex mesh interface is removed, the entries in that list will\nnever get cleaned. Fix this by flushing all corresponding items of the\npreq_queue in mesh_path_flush_pending().\n\nThis should take care of KASAN reports like this:\n\nunreferenced object 0xffff00000668d800 (size 128):\n  comm \"kworker/u8:4\", pid 67, jiffies 4295419552 (age 1836.444s)\n  hex dump (first 32 bytes):\n    00 1f 05 09 00 00 ff ff 00 d5 68 06 00 00 ff ff  ..........h.....\n    8e 97 ea eb 3e b8 01 00 00 00 00 00 00 00 00 00  ....>...........\n  backtrace:\n    [<000000007302a0b6>] __kmem_cache_alloc_node+0x1e0/0x35c\n    [<00000000049bd418>] kmalloc_trace+0x34/0x80\n    [<0000000000d792bb>] mesh_queue_preq+0x44/0x2a8\n    [<00000000c99c3696>] mesh_nexthop_resolve+0x198/0x19c\n    [<00000000926bf598>] ieee80211_xmit+0x1d0/0x1f4\n    [<00000000fc8c2284>] __ieee80211_subif_start_xmit+0x30c/0x764\n    [<000000005926ee38>] ieee80211_subif_start_xmit+0x9c/0x7a4\n    [<000000004c86e916>] dev_hard_start_xmit+0x174/0x440\n    [<0000000023495647>] __dev_queue_xmit+0xe24/0x111c\n    [<00000000cfe9ca78>] batadv_send_skb_packet+0x180/0x1e4\n    [<000000007bacc5d5>] batadv_v_elp_periodic_work+0x2f4/0x508\n    [<00000000adc3cd94>] process_one_work+0x4b8/0xa1c\n    [<00000000b36425d1>] worker_thread+0x9c/0x634\n    [<0000000005852dd5>] kthread+0x1bc/0x1c4\n    [<000000005fccd770>] ret_from_fork+0x10/0x20\nunreferenced object 0xffff000009051f00 (size 128):\n  comm \"kworker/u8:4\", pid 67, jiffies 4295419553 (age 1836.440s)\n  hex dump (first 32 bytes):\n    90 d6 92 0d 00 00 ff ff 00 d8 68 06 00 00 ff ff  ..........h.....\n    36 27 92 e4 02 e0 01 00 00 58 79 06 00 00 ff ff  6'.......Xy.....\n  backtrace:\n    [<000000007302a0b6>] __kmem_cache_alloc_node+0x1e0/0x35c\n    [<00000000049bd418>] kmalloc_trace+0x34/0x80\n    [<0000000000d792bb>] mesh_queue_preq+0x44/0x2a8\n    [<00000000c99c3696>] mesh_nexthop_resolve+0x198/0x19c\n    [<00000000926bf598>] ieee80211_xmit+0x1d0/0x1f4\n    [<00000000fc8c2284>] __ieee80211_subif_start_xmit+0x30c/0x764\n    [<000000005926ee38>] ieee80211_subif_start_xmit+0x9c/0x7a4\n    [<000000004c86e916>] dev_hard_start_xmit+0x174/0x440\n    [<0000000023495647>] __dev_queue_xmit+0xe24/0x111c\n    [<00000000cfe9ca78>] batadv_send_skb_packet+0x180/0x1e4\n    [<000000007bacc5d5>] batadv_v_elp_periodic_work+0x2f4/0x508\n    [<00000000adc3cd94>] process_one_work+0x4b8/0xa1c\n    [<00000000b36425d1>] worker_thread+0x9c/0x634\n    [<0000000005852dd5>] kthread+0x1bc/0x1c4\n    [<000000005fccd770>] ret_from_fork+0x10/0x20",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1078"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"LOW",
						"baseScore":3.9,
						"vectorString":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Low",
					"category":"impact"
				}
			],
			"title":"CVE-2024-40942"
		},
		{
			"cve":"CVE-2024-41017",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\njfs: don't walk off the end of ealist\n\nAdd a check before visiting the members of ea to\nmake sure each ea stays within the ealist.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1078"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"LOW",
						"baseScore":3.9,
						"vectorString":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Low",
					"category":"impact"
				}
			],
			"title":"CVE-2024-41017"
		},
		{
			"cve":"CVE-2024-41022",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amdgpu: Fix signedness bug in sdma_v4_0_process_trap_irq()\n\nThe \"instance\" variable needs to be signed for the error handling to work.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1078"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"LOW",
						"baseScore":3.9,
						"vectorString":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Low",
					"category":"impact"
				}
			],
			"title":"CVE-2024-41022"
		},
		{
			"cve":"CVE-2024-41027",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nFix userfaultfd_api to return EINVAL as expected\n\nCurrently if we request a feature that is not set in the Kernel config we\nfail silently and return all the available features.  However, the man\npage indicates we should return an EINVAL.\n\nWe need to fix this issue since we can end up with a Kernel warning should\na program request the feature UFFD_FEATURE_WP_UNPOPULATED on a kernel with\nthe config not set with this feature.\n\n [  200.812896] WARNING: CPU: 91 PID: 13634 at mm/memory.c:1660 zap_pte_range+0x43d/0x660\n [  200.820738] Modules linked in:\n [  200.869387] CPU: 91 PID: 13634 Comm: userfaultfd Kdump: loaded Not tainted 6.9.0-rc5+ #8\n [  200.877477] Hardware name: Dell Inc. PowerEdge R6525/0N7YGH, BIOS 2.7.3 03/30/2022\n [  200.885052] RIP: 0010:zap_pte_range+0x43d/0x660",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1078"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"LOW",
						"baseScore":3.9,
						"vectorString":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Low",
					"category":"impact"
				}
			],
			"title":"CVE-2024-41027"
		},
		{
			"cve":"CVE-2024-41034",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nnilfs2: fix kernel bug on rename operation of broken directory\n\nSyzbot reported that in rename directory operation on broken directory on\nnilfs2, __block_write_begin_int() called to prepare block write may fail\nBUG_ON check for access exceeding the folio/page size.\n\nThis is because nilfs_dotdot(), which gets parent directory reference\nentry (\"..\") of the directory to be moved or renamed, does not check\nconsistency enough, and may return location exceeding folio/page size for\nbroken directories.\n\nFix this issue by checking required directory entries (\".\" and \"..\") in\nthe first chunk of the directory in nilfs_dotdot().",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1078"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"LOW",
						"baseScore":3.9,
						"vectorString":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Low",
					"category":"impact"
				}
			],
			"title":"CVE-2024-41034"
		},
		{
			"cve":"CVE-2024-41055",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nmm: prevent derefencing NULL ptr in pfn_section_valid()\n\nCommit 5ec8e8ea8b77 (\"mm/sparsemem: fix race in accessing\nmemory_section->usage\") changed pfn_section_valid() to add a READ_ONCE()\ncall around \"ms->usage\" to fix a race with section_deactivate() where\nms->usage can be cleared.  The READ_ONCE() call, by itself, is not enough\nto prevent NULL pointer dereference.  We need to check its value before\ndereferencing it.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1078"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-41055"
		},
		{
			"cve":"CVE-2024-41065",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\npowerpc/pseries: Whitelist dtl slub object for copying to userspace\n\nReading the dispatch trace log from /sys/kernel/debug/powerpc/dtl/cpu-*\nresults in a BUG() when the config CONFIG_HARDENED_USERCOPY is enabled as\nshown below.\n\n    kernel BUG at mm/usercopy.c:102!\n    Oops: Exception in kernel mode, sig: 5 [#1]\n    LE PAGE_SIZE=64K MMU=Radix SMP NR_CPUS=2048 NUMA pSeries\n    Modules linked in: xfs libcrc32c dm_service_time sd_mod t10_pi sg ibmvfc\n    scsi_transport_fc ibmveth pseries_wdt dm_multipath dm_mirror dm_region_hash dm_log dm_mod fuse\n    CPU: 27 PID: 1815 Comm: python3 Not tainted 6.10.0-rc3 #85\n    Hardware name: IBM,9040-MRX POWER10 (raw) 0x800200 0xf000006 of:IBM,FW1060.00 (NM1060_042) hv:phyp pSeries\n    NIP:  c0000000005d23d4 LR: c0000000005d23d0 CTR: 00000000006ee6f8\n    REGS: c000000120c078c0 TRAP: 0700   Not tainted  (6.10.0-rc3)\n    MSR:  8000000000029033 <SF,EE,ME,IR,DR,RI,LE>  CR: 2828220f  XER: 0000000e\n    CFAR: c0000000001fdc80 IRQMASK: 0\n    [ ... GPRs omitted ... ]\n    NIP [c0000000005d23d4] usercopy_abort+0x78/0xb0\n    LR [c0000000005d23d0] usercopy_abort+0x74/0xb0\n    Call Trace:\n     usercopy_abort+0x74/0xb0 (unreliable)\n     __check_heap_object+0xf8/0x120\n     check_heap_object+0x218/0x240\n     __check_object_size+0x84/0x1a4\n     dtl_file_read+0x17c/0x2c4\n     full_proxy_read+0x8c/0x110\n     vfs_read+0xdc/0x3a0\n     ksys_read+0x84/0x144\n     system_call_exception+0x124/0x330\n     system_call_vectored_common+0x15c/0x2ec\n    --- interrupt: 3000 at 0x7fff81f3ab34\n\nCommit 6d07d1cd300f (\"usercopy: Restrict non-usercopy caches to size 0\")\nrequires that only whitelisted areas in slab/slub objects can be copied to\nuserspace when usercopy hardening is enabled using CONFIG_HARDENED_USERCOPY.\nDtl contains hypervisor dispatch events which are expected to be read by\nprivileged users. Hence mark this safe for user access.\nSpecify useroffset=0 and usersize=DISPATCH_LOG_BYTES to whitelist the\nentire object.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1078"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"LOW",
						"baseScore":3.9,
						"vectorString":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Low",
					"category":"impact"
				}
			],
			"title":"CVE-2024-41065"
		},
		{
			"cve":"CVE-2024-41070",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nKVM: PPC: Book3S HV: Prevent UAF in kvm_spapr_tce_attach_iommu_group()\n\nAl reported a possible use-after-free (UAF) in kvm_spapr_tce_attach_iommu_group().\n\nIt looks up `stt` from tablefd, but then continues to use it after doing\nfdput() on the returned fd. After the fdput() the tablefd is free to be\nclosed by another thread. The close calls kvm_spapr_tce_release() and\nthen release_spapr_tce_table() (via call_rcu()) which frees `stt`.\n\nAlthough there are calls to rcu_read_lock() in\nkvm_spapr_tce_attach_iommu_group() they are not sufficient to prevent\nthe UAF, because `stt` is used outside the locked regions.\n\nWith an artifcial delay after the fdput() and a userspace program which\ntriggers the race, KASAN detects the UAF:\n\n  BUG: KASAN: slab-use-after-free in kvm_spapr_tce_attach_iommu_group+0x298/0x720 [kvm]\n  Read of size 4 at addr c000200027552c30 by task kvm-vfio/2505\n  CPU: 54 PID: 2505 Comm: kvm-vfio Not tainted 6.10.0-rc3-next-20240612-dirty #1\n  Hardware name: 8335-GTH POWER9 0x4e1202 opal:skiboot-v6.5.3-35-g1851b2a06 PowerNV\n  Call Trace:\n    dump_stack_lvl+0xb4/0x108 (unreliable)\n    print_report+0x2b4/0x6ec\n    kasan_report+0x118/0x2b0\n    __asan_load4+0xb8/0xd0\n    kvm_spapr_tce_attach_iommu_group+0x298/0x720 [kvm]\n    kvm_vfio_set_attr+0x524/0xac0 [kvm]\n    kvm_device_ioctl+0x144/0x240 [kvm]\n    sys_ioctl+0x62c/0x1810\n    system_call_exception+0x190/0x440\n    system_call_vectored_common+0x15c/0x2ec\n  ...\n  Freed by task 0:\n   ...\n   kfree+0xec/0x3e0\n   release_spapr_tce_table+0xd4/0x11c [kvm]\n   rcu_core+0x568/0x16a0\n   handle_softirqs+0x23c/0x920\n   do_softirq_own_stack+0x6c/0x90\n   do_softirq_own_stack+0x58/0x90\n   __irq_exit_rcu+0x218/0x2d0\n   irq_exit+0x30/0x80\n   arch_local_irq_restore+0x128/0x230\n   arch_local_irq_enable+0x1c/0x30\n   cpuidle_enter_state+0x134/0x5cc\n   cpuidle_enter+0x6c/0xb0\n   call_cpuidle+0x7c/0x100\n   do_idle+0x394/0x410\n   cpu_startup_entry+0x60/0x70\n   start_secondary+0x3fc/0x410\n   start_secondary_prolog+0x10/0x14\n\nFix it by delaying the fdput() until `stt` is no longer in use, which\nis effectively the entire function. To keep the patch minimal add a call\nto fdput() at each of the existing return paths. Future work can convert\nthe function to goto or __cleanup style cleanup.\n\nWith the fix in place the test case no longer triggers the UAF.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1078"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.8,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2024-41070"
		},
		{
			"cve":"CVE-2024-41078",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: qgroup: fix quota root leak after quota disable failure\n\nIf during the quota disable we fail when cleaning the quota tree or when\ndeleting the root from the root tree, we jump to the 'out' label without\never dropping the reference on the quota root, resulting in a leak of the\nroot since fs_info->quota_root is no longer pointing to the root (we have\nset it to NULL just before those steps).\n\nFix this by always doing a btrfs_put_root() call under the 'out' label.\nThis is a problem that exists since qgroups were first added in 2012 by\ncommit bed92eae26cc (\"Btrfs: qgroup implementation and prototypes\"), but\nback then we missed a kfree on the quota root and free_extent_buffer()\ncalls on its root and commit root nodes, since back then roots were not\nyet reference counted.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1078"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"LOW",
						"baseScore":3.9,
						"vectorString":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Low",
					"category":"impact"
				}
			],
			"title":"CVE-2024-41078"
		},
		{
			"cve":"CVE-2024-41081",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nila: block BH in ila_output()\n\nAs explained in commit 1378817486d6 (\"tipc: block BH\nbefore using dst_cache\"), net/core/dst_cache.c\nhelpers need to be called with BH disabled.\n\nila_output() is called from lwtunnel_output()\npossibly from process context, and under rcu_read_lock().\n\nWe might be interrupted by a softirq, re-enter ila_output()\nand corrupt dst_cache data structures.\n\nFix the race by using local_bh_disable().",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1078"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"LOW",
						"baseScore":3.9,
						"vectorString":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Low",
					"category":"impact"
				}
			],
			"title":"CVE-2024-41081"
		},
		{
			"cve":"CVE-2024-41089",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/nouveau/dispnv04: fix null pointer dereference in nv17_tv_get_hd_modes\n\nIn nv17_tv_get_hd_modes(), the return value of drm_mode_duplicate() is\nassigned to mode, which will lead to a possible NULL pointer dereference\non failure of drm_mode_duplicate(). The same applies to drm_cvt_mode().\nAdd a check to avoid null pointer dereference.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1078"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-41089"
		},
		{
			"cve":"CVE-2024-41095",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/nouveau/dispnv04: fix null pointer dereference in nv17_tv_get_ld_modes\n\nIn nv17_tv_get_ld_modes(), the return value of drm_mode_duplicate() is\nassigned to mode, which will lead to a possible NULL pointer dereference\non failure of drm_mode_duplicate(). Add a check to avoid npd.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1078"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-41095"
		},
		{
			"cve":"CVE-2024-41097",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nusb: atm: cxacru: fix endpoint checking in cxacru_bind()\n\nSyzbot is still reporting quite an old issue [1] that occurs due to\nincomplete checking of present usb endpoints. As such, wrong\nendpoints types may be used at urb sumbitting stage which in turn\ntriggers a warning in usb_submit_urb().\n\nFix the issue by verifying that required endpoint types are present\nfor both in and out endpoints, taking into account cmd endpoint type.\n\nUnfortunately, this patch has not been tested on real hardware.\n\n[1] Syzbot report:\nusb 1-1: BOGUS urb xfer, pipe 1 != type 3\nWARNING: CPU: 0 PID: 8667 at drivers/usb/core/urb.c:502 usb_submit_urb+0xed2/0x18a0 drivers/usb/core/urb.c:502\nModules linked in:\nCPU: 0 PID: 8667 Comm: kworker/0:4 Not tainted 5.14.0-rc4-syzkaller #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011\nWorkqueue: usb_hub_wq hub_event\nRIP: 0010:usb_submit_urb+0xed2/0x18a0 drivers/usb/core/urb.c:502\n...\nCall Trace:\n cxacru_cm+0x3c0/0x8e0 drivers/usb/atm/cxacru.c:649\n cxacru_card_status+0x22/0xd0 drivers/usb/atm/cxacru.c:760\n cxacru_bind+0x7ac/0x11a0 drivers/usb/atm/cxacru.c:1209\n usbatm_usb_probe+0x321/0x1ae0 drivers/usb/atm/usbatm.c:1055\n cxacru_usb_probe+0xdf/0x1e0 drivers/usb/atm/cxacru.c:1363\n usb_probe_interface+0x315/0x7f0 drivers/usb/core/driver.c:396\n call_driver_probe drivers/base/dd.c:517 [inline]\n really_probe+0x23c/0xcd0 drivers/base/dd.c:595\n __driver_probe_device+0x338/0x4d0 drivers/base/dd.c:747\n driver_probe_device+0x4c/0x1a0 drivers/base/dd.c:777\n __device_attach_driver+0x20b/0x2f0 drivers/base/dd.c:894\n bus_for_each_drv+0x15f/0x1e0 drivers/base/bus.c:427\n __device_attach+0x228/0x4a0 drivers/base/dd.c:965\n bus_probe_device+0x1e4/0x290 drivers/base/bus.c:487\n device_add+0xc2f/0x2180 drivers/base/core.c:3354\n usb_set_configuration+0x113a/0x1910 drivers/usb/core/message.c:2170\n usb_generic_driver_probe+0xba/0x100 drivers/usb/core/generic.c:238\n usb_probe_device+0xd9/0x2c0 drivers/usb/core/driver.c:293",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1078"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-41097"
		},
		{
			"cve":"CVE-2024-42076",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nnet: can: j1939: Initialize unused data in j1939_send_one()\n\nsyzbot reported kernel-infoleak in raw_recvmsg() [1]. j1939_send_one()\ncreates full frame including unused data, but it doesn't initialize\nit. This causes the kernel-infoleak issue. Fix this by initializing\nunused data.\n\n[1]\nBUG: KMSAN: kernel-infoleak in instrument_copy_to_user include/linux/instrumented.h:114 [inline]\nBUG: KMSAN: kernel-infoleak in copy_to_user_iter lib/iov_iter.c:24 [inline]\nBUG: KMSAN: kernel-infoleak in iterate_ubuf include/linux/iov_iter.h:29 [inline]\nBUG: KMSAN: kernel-infoleak in iterate_and_advance2 include/linux/iov_iter.h:245 [inline]\nBUG: KMSAN: kernel-infoleak in iterate_and_advance include/linux/iov_iter.h:271 [inline]\nBUG: KMSAN: kernel-infoleak in _copy_to_iter+0x366/0x2520 lib/iov_iter.c:185\n instrument_copy_to_user include/linux/instrumented.h:114 [inline]\n copy_to_user_iter lib/iov_iter.c:24 [inline]\n iterate_ubuf include/linux/iov_iter.h:29 [inline]\n iterate_and_advance2 include/linux/iov_iter.h:245 [inline]\n iterate_and_advance include/linux/iov_iter.h:271 [inline]\n _copy_to_iter+0x366/0x2520 lib/iov_iter.c:185\n copy_to_iter include/linux/uio.h:196 [inline]\n memcpy_to_msg include/linux/skbuff.h:4113 [inline]\n raw_recvmsg+0x2b8/0x9e0 net/can/raw.c:1008\n sock_recvmsg_nosec net/socket.c:1046 [inline]\n sock_recvmsg+0x2c4/0x340 net/socket.c:1068\n ____sys_recvmsg+0x18a/0x620 net/socket.c:2803\n ___sys_recvmsg+0x223/0x840 net/socket.c:2845\n do_recvmmsg+0x4fc/0xfd0 net/socket.c:2939\n __sys_recvmmsg net/socket.c:3018 [inline]\n __do_sys_recvmmsg net/socket.c:3041 [inline]\n __se_sys_recvmmsg net/socket.c:3034 [inline]\n __x64_sys_recvmmsg+0x397/0x490 net/socket.c:3034\n x64_sys_call+0xf6c/0x3b50 arch/x86/include/generated/asm/syscalls_64.h:300\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0xcf/0x1e0 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n\nUninit was created at:\n slab_post_alloc_hook mm/slub.c:3804 [inline]\n slab_alloc_node mm/slub.c:3845 [inline]\n kmem_cache_alloc_node+0x613/0xc50 mm/slub.c:3888\n kmalloc_reserve+0x13d/0x4a0 net/core/skbuff.c:577\n __alloc_skb+0x35b/0x7a0 net/core/skbuff.c:668\n alloc_skb include/linux/skbuff.h:1313 [inline]\n alloc_skb_with_frags+0xc8/0xbf0 net/core/skbuff.c:6504\n sock_alloc_send_pskb+0xa81/0xbf0 net/core/sock.c:2795\n sock_alloc_send_skb include/net/sock.h:1842 [inline]\n j1939_sk_alloc_skb net/can/j1939/socket.c:878 [inline]\n j1939_sk_send_loop net/can/j1939/socket.c:1142 [inline]\n j1939_sk_sendmsg+0xc0a/0x2730 net/can/j1939/socket.c:1277\n sock_sendmsg_nosec net/socket.c:730 [inline]\n __sock_sendmsg+0x30f/0x380 net/socket.c:745\n ____sys_sendmsg+0x877/0xb60 net/socket.c:2584\n ___sys_sendmsg+0x28d/0x3c0 net/socket.c:2638\n __sys_sendmsg net/socket.c:2667 [inline]\n __do_sys_sendmsg net/socket.c:2676 [inline]\n __se_sys_sendmsg net/socket.c:2674 [inline]\n __x64_sys_sendmsg+0x307/0x4a0 net/socket.c:2674\n x64_sys_call+0xc4b/0x3b50 arch/x86/include/generated/asm/syscalls_64.h:47\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0xcf/0x1e0 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n\nBytes 12-15 of 16 are uninitialized\nMemory access of size 16 starts at ffff888120969690\nData copied to user address 00000000200017c0\n\nCPU: 1 PID: 5050 Comm: syz-executor198 Not tainted 6.9.0-rc5-syzkaller-00031-g71b1543c83d6 #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1078"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-42076"
		},
		{
			"cve":"CVE-2024-42077",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nocfs2: fix DIO failure due to insufficient transaction credits\n\nThe code in ocfs2_dio_end_io_write() estimates number of necessary\ntransaction credits using ocfs2_calc_extend_credits().  This however does\nnot take into account that the IO could be arbitrarily large and can\ncontain arbitrary number of extents.\n\nExtent tree manipulations do often extend the current transaction but not\nin all of the cases.  For example if we have only single block extents in\nthe tree, ocfs2_mark_extent_written() will end up calling\nocfs2_replace_extent_rec() all the time and we will never extend the\ncurrent transaction and eventually exhaust all the transaction credits if\nthe IO contains many single block extents.  Once that happens a\nWARN_ON(jbd2_handle_buffer_credits(handle) <= 0) is triggered in\njbd2_journal_dirty_metadata() and subsequently OCFS2 aborts in response to\nthis error.  This was actually triggered by one of our customers on a\nheavily fragmented OCFS2 filesystem.\n\nTo fix the issue make sure the transaction always has enough credits for\none extent insert before each call of ocfs2_mark_extent_written().\n\nHeming Zhao said:\n\n------\nPANIC: \"Kernel panic - not syncing: OCFS2: (device dm-1): panic forced after error\"\n\nPID: xxx  TASK: xxxx  CPU: 5  COMMAND: \"SubmitThread-CA\"\n  #0 machine_kexec at ffffffff8c069932\n  #1 __crash_kexec at ffffffff8c1338fa\n  #2 panic at ffffffff8c1d69b9\n  #3 ocfs2_handle_error at ffffffffc0c86c0c [ocfs2]\n  #4 __ocfs2_abort at ffffffffc0c88387 [ocfs2]\n  #5 ocfs2_journal_dirty at ffffffffc0c51e98 [ocfs2]\n  #6 ocfs2_split_extent at ffffffffc0c27ea3 [ocfs2]\n  #7 ocfs2_change_extent_flag at ffffffffc0c28053 [ocfs2]\n  #8 ocfs2_mark_extent_written at ffffffffc0c28347 [ocfs2]\n  #9 ocfs2_dio_end_io_write at ffffffffc0c2bef9 [ocfs2]\n#10 ocfs2_dio_end_io at ffffffffc0c2c0f5 [ocfs2]\n#11 dio_complete at ffffffff8c2b9fa7\n#12 do_blockdev_direct_IO at ffffffff8c2bc09f\n#13 ocfs2_direct_IO at ffffffffc0c2b653 [ocfs2]\n#14 generic_file_direct_write at ffffffff8c1dcf14\n#15 __generic_file_write_iter at ffffffff8c1dd07b\n#16 ocfs2_file_write_iter at ffffffffc0c49f1f [ocfs2]\n#17 aio_write at ffffffff8c2cc72e\n#18 kmem_cache_alloc at ffffffff8c248dde\n#19 do_io_submit at ffffffff8c2ccada\n#20 do_syscall_64 at ffffffff8c004984\n#21 entry_SYSCALL_64_after_hwframe at ffffffff8c8000ba",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1078"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-42077"
		},
		{
			"cve":"CVE-2024-42080",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/restrack: Fix potential invalid address access\n\nstruct rdma_restrack_entry's kern_name was set to KBUILD_MODNAME\nin ib_create_cq(), while if the module exited but forgot del this\nrdma_restrack_entry, it would cause a invalid address access in\nrdma_restrack_clean() when print the owner of this rdma_restrack_entry.\n\nThese code is used to help find one forgotten PD release in one of the\nULPs. But it is not needed anymore, so delete them.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1078"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-42080"
		},
		{
			"cve":"CVE-2024-42082",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nxdp: Remove WARN() from __xdp_reg_mem_model()\n\nsyzkaller reports a warning in __xdp_reg_mem_model().\n\nThe warning occurs only if __mem_id_init_hash_table() returns an error. It\nreturns the error in two cases:\n\n  1. memory allocation fails;\n  2. rhashtable_init() fails when some fields of rhashtable_params\n     struct are not initialized properly.\n\nThe second case cannot happen since there is a static const rhashtable_params\nstruct with valid fields. So, warning is only triggered when there is a\nproblem with memory allocation.\n\nThus, there is no sense in using WARN() to handle this error and it can be\nsafely removed.\n\nWARNING: CPU: 0 PID: 5065 at net/core/xdp.c:299 __xdp_reg_mem_model+0x2d9/0x650 net/core/xdp.c:299\n\nCPU: 0 PID: 5065 Comm: syz-executor883 Not tainted 6.8.0-syzkaller-05271-gf99c5f563c17 #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024\nRIP: 0010:__xdp_reg_mem_model+0x2d9/0x650 net/core/xdp.c:299\n\nCall Trace:\n xdp_reg_mem_model+0x22/0x40 net/core/xdp.c:344\n xdp_test_run_setup net/bpf/test_run.c:188 [inline]\n bpf_test_run_xdp_live+0x365/0x1e90 net/bpf/test_run.c:377\n bpf_prog_test_run_xdp+0x813/0x11b0 net/bpf/test_run.c:1267\n bpf_prog_test_run+0x33a/0x3b0 kernel/bpf/syscall.c:4240\n __sys_bpf+0x48d/0x810 kernel/bpf/syscall.c:5649\n __do_sys_bpf kernel/bpf/syscall.c:5738 [inline]\n __se_sys_bpf kernel/bpf/syscall.c:5736 [inline]\n __x64_sys_bpf+0x7c/0x90 kernel/bpf/syscall.c:5736\n do_syscall_64+0xfb/0x240\n entry_SYSCALL_64_after_hwframe+0x6d/0x75\n\nFound by Linux Verification Center (linuxtesting.org) with syzkaller.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1078"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-42082"
		},
		{
			"cve":"CVE-2024-42084",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nftruncate: pass a signed offset\n\nThe old ftruncate() syscall, using the 32-bit off_t misses a sign\nextension when called in compat mode on 64-bit architectures.  As a\nresult, passing a negative length accidentally succeeds in truncating\nto file size between 2GiB and 4GiB.\n\nChanging the type of the compat syscall to the signed compat_off_t\nchanges the behavior so it instead returns -EINVAL.\n\nThe native entry point, the truncate() syscall and the corresponding\nloff_t based variants are all correct already and do not suffer\nfrom this mistake.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1078"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":6.3,
						"vectorString":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-42084"
		},
		{
			"cve":"CVE-2024-42087",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/panel: ilitek-ili9881c: Fix warning with GPIO controllers that sleep\n\nThe ilitek-ili9881c controls the reset GPIO using the non-sleeping\ngpiod_set_value() function. This complains loudly when the GPIO\ncontroller needs to sleep. As the caller can sleep, use\ngpiod_set_value_cansleep() to fix the issue.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1078"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"LOW",
						"baseScore":3.3,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Low",
					"category":"impact"
				}
			],
			"title":"CVE-2024-42087"
		},
		{
			"cve":"CVE-2024-42089",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: fsl-asoc-card: set priv->pdev before using it\n\npriv->pdev pointer was set after being used in\nfsl_asoc_card_audmux_init().\nMove this assignment at the start of the probe function, so\nsub-functions can correctly use pdev through priv.\n\nfsl_asoc_card_audmux_init() dereferences priv->pdev to get access to the\ndev struct, used with dev_err macros.\nAs priv is zero-initialised, there would be a NULL pointer dereference.\nNote that if priv->dev is dereferenced before assignment but never used,\nfor example if there is no error to be printed, the driver won't crash\nprobably due to compiler optimisations.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1078"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-42089"
		},
		{
			"cve":"CVE-2024-42090",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\npinctrl: fix deadlock in create_pinctrl() when handling -EPROBE_DEFER\n\nIn create_pinctrl(), pinctrl_maps_mutex is acquired before calling\nadd_setting(). If add_setting() returns -EPROBE_DEFER, create_pinctrl()\ncalls pinctrl_free(). However, pinctrl_free() attempts to acquire\npinctrl_maps_mutex, which is already held by create_pinctrl(), leading to\na potential deadlock.\n\nThis patch resolves the issue by releasing pinctrl_maps_mutex before\ncalling pinctrl_free(), preventing the deadlock.\n\nThis bug was discovered and resolved using Coverity Static Analysis\nSecurity Testing (SAST) by Synopsys, Inc.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1078"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-42090"
		},
		{
			"cve":"CVE-2024-42092",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\ngpio: davinci: Validate the obtained number of IRQs\n\nValue of pdata->gpio_unbanked is taken from Device Tree. In case of broken\nDT due to any error this value can be any. Without this value validation\nthere can be out of chips->irqs array boundaries access in\ndavinci_gpio_probe().\n\nValidate the obtained nirq value so that it won't exceed the maximum\nnumber of IRQs per bank.\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1078"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-42092"
		},
		{
			"cve":"CVE-2024-42093",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nnet/dpaa2: Avoid explicit cpumask var allocation on stack\n\nFor CONFIG_CPUMASK_OFFSTACK=y kernel, explicit allocation of cpumask\nvariable on stack is not recommended since it can cause potential stack\noverflow.\n\nInstead, kernel code should always use *cpumask_var API(s) to allocate\ncpumask var in config-neutral way, leaving allocation strategy to\nCONFIG_CPUMASK_OFFSTACK.\n\nUse *cpumask_var API(s) to address it.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1078"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.8,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2024-42093"
		},
		{
			"cve":"CVE-2024-42094",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nnet/iucv: Avoid explicit cpumask var allocation on stack\n\nFor CONFIG_CPUMASK_OFFSTACK=y kernel, explicit allocation of cpumask\nvariable on stack is not recommended since it can cause potential stack\noverflow.\n\nInstead, kernel code should always use *cpumask_var API(s) to allocate\ncpumask var in config-neutral way, leaving allocation strategy to\nCONFIG_CPUMASK_OFFSTACK.\n\nUse *cpumask_var API(s) to address it.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1078"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.8,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2024-42094"
		},
		{
			"cve":"CVE-2024-42095",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nserial: 8250_omap: Implementation of Errata i2310\n\nAs per Errata i2310[0], Erroneous timeout can be triggered,\nif this Erroneous interrupt is not cleared then it may leads\nto storm of interrupts, therefore apply Errata i2310 solution.\n\n[0] https://www.ti.com/lit/pdf/sprz536 page 23",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1078"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-42095"
		},
		{
			"cve":"CVE-2024-42096",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nx86: stop playing stack games in profile_pc()\n\nThe 'profile_pc()' function is used for timer-based profiling, which\nisn't really all that relevant any more to begin with, but it also ends\nup making assumptions based on the stack layout that aren't necessarily\nvalid.\n\nBasically, the code tries to account the time spent in spinlocks to the\ncaller rather than the spinlock, and while I support that as a concept,\nit's not worth the code complexity or the KASAN warnings when no serious\nprofiling is done using timers anyway these days.\n\nAnd the code really does depend on stack layout that is only true in the\nsimplest of cases.  We've lost the comment at some point (I think when\nthe 32-bit and 64-bit code was unified), but it used to say:\n\n\tAssume the lock function has either no stack frame or a copy\n\tof eflags from PUSHF.\n\nwhich explains why it just blindly loads a word or two straight off the\nstack pointer and then takes a minimal look at the values to just check\nif they might be eflags or the return pc:\n\n\tEflags always has bits 22 and up cleared unlike kernel addresses\n\nbut that basic stack layout assumption assumes that there isn't any lock\ndebugging etc going on that would complicate the code and cause a stack\nframe.\n\nIt causes KASAN unhappiness reported for years by syzkaller [1] and\nothers [2].\n\nWith no real practical reason for this any more, just remove the code.\n\nJust for historical interest, here's some background commits relating to\nthis code from 2006:\n\n  0cb91a229364 (\"i386: Account spinlocks to the caller during profiling for !FP kernels\")\n  31679f38d886 (\"Simplify profile_pc on x86-64\")\n\nand a code unification from 2009:\n\n  ef4512882dbe (\"x86: time_32/64.c unify profile_pc\")\n\nbut the basics of this thing actually goes back to before the git tree.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1078"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":6.1,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-42096"
		},
		{
			"cve":"CVE-2024-42098",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: ecdh - explicitly zeroize private_key\n\nprivate_key is overwritten with the key parameter passed in by the\ncaller (if present), or alternatively a newly generated private key.\nHowever, it is possible that the caller provides a key (or the newly\ngenerated key) which is shorter than the previous key. In that\nscenario, some key material from the previous key would not be\noverwritten. The easiest solution is to explicitly zeroize the entire\nprivate_key array first.\n\nNote that this patch slightly changes the behavior of this function:\npreviously, if the ecc_gen_privkey failed, the old private_key would\nremain. Now, the private_key is always zeroized. This behavior is\nconsistent with the case where params.key is set and ecc_is_key_valid\nfails.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1078"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-42098"
		},
		{
			"cve":"CVE-2024-42106",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\ninet_diag: Initialize pad field in struct inet_diag_req_v2\n\nKMSAN reported uninit-value access in raw_lookup() [1]. Diag for raw\nsockets uses the pad field in struct inet_diag_req_v2 for the\nunderlying protocol. This field corresponds to the sdiag_raw_protocol\nfield in struct inet_diag_req_raw.\n\ninet_diag_get_exact_compat() converts inet_diag_req to\ninet_diag_req_v2, but leaves the pad field uninitialized. So the issue\noccurs when raw_lookup() accesses the sdiag_raw_protocol field.\n\nFix this by initializing the pad field in\ninet_diag_get_exact_compat(). Also, do the same fix in\ninet_diag_dump_compat() to avoid the similar issue in the future.\n\n[1]\nBUG: KMSAN: uninit-value in raw_lookup net/ipv4/raw_diag.c:49 [inline]\nBUG: KMSAN: uninit-value in raw_sock_get+0x657/0x800 net/ipv4/raw_diag.c:71\n raw_lookup net/ipv4/raw_diag.c:49 [inline]\n raw_sock_get+0x657/0x800 net/ipv4/raw_diag.c:71\n raw_diag_dump_one+0xa1/0x660 net/ipv4/raw_diag.c:99\n inet_diag_cmd_exact+0x7d9/0x980\n inet_diag_get_exact_compat net/ipv4/inet_diag.c:1404 [inline]\n inet_diag_rcv_msg_compat+0x469/0x530 net/ipv4/inet_diag.c:1426\n sock_diag_rcv_msg+0x23d/0x740 net/core/sock_diag.c:282\n netlink_rcv_skb+0x537/0x670 net/netlink/af_netlink.c:2564\n sock_diag_rcv+0x35/0x40 net/core/sock_diag.c:297\n netlink_unicast_kernel net/netlink/af_netlink.c:1335 [inline]\n netlink_unicast+0xe74/0x1240 net/netlink/af_netlink.c:1361\n netlink_sendmsg+0x10c6/0x1260 net/netlink/af_netlink.c:1905\n sock_sendmsg_nosec net/socket.c:730 [inline]\n __sock_sendmsg+0x332/0x3d0 net/socket.c:745\n ____sys_sendmsg+0x7f0/0xb70 net/socket.c:2585\n ___sys_sendmsg+0x271/0x3b0 net/socket.c:2639\n __sys_sendmsg net/socket.c:2668 [inline]\n __do_sys_sendmsg net/socket.c:2677 [inline]\n __se_sys_sendmsg net/socket.c:2675 [inline]\n __x64_sys_sendmsg+0x27e/0x4a0 net/socket.c:2675\n x64_sys_call+0x135e/0x3ce0 arch/x86/include/generated/asm/syscalls_64.h:47\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0xd9/0x1e0 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n\nUninit was stored to memory at:\n raw_sock_get+0x650/0x800 net/ipv4/raw_diag.c:71\n raw_diag_dump_one+0xa1/0x660 net/ipv4/raw_diag.c:99\n inet_diag_cmd_exact+0x7d9/0x980\n inet_diag_get_exact_compat net/ipv4/inet_diag.c:1404 [inline]\n inet_diag_rcv_msg_compat+0x469/0x530 net/ipv4/inet_diag.c:1426\n sock_diag_rcv_msg+0x23d/0x740 net/core/sock_diag.c:282\n netlink_rcv_skb+0x537/0x670 net/netlink/af_netlink.c:2564\n sock_diag_rcv+0x35/0x40 net/core/sock_diag.c:297\n netlink_unicast_kernel net/netlink/af_netlink.c:1335 [inline]\n netlink_unicast+0xe74/0x1240 net/netlink/af_netlink.c:1361\n netlink_sendmsg+0x10c6/0x1260 net/netlink/af_netlink.c:1905\n sock_sendmsg_nosec net/socket.c:730 [inline]\n __sock_sendmsg+0x332/0x3d0 net/socket.c:745\n ____sys_sendmsg+0x7f0/0xb70 net/socket.c:2585\n ___sys_sendmsg+0x271/0x3b0 net/socket.c:2639\n __sys_sendmsg net/socket.c:2668 [inline]\n __do_sys_sendmsg net/socket.c:2677 [inline]\n __se_sys_sendmsg net/socket.c:2675 [inline]\n __x64_sys_sendmsg+0x27e/0x4a0 net/socket.c:2675\n x64_sys_call+0x135e/0x3ce0 arch/x86/include/generated/asm/syscalls_64.h:47\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0xd9/0x1e0 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n\nLocal variable req.i created at:\n inet_diag_get_exact_compat net/ipv4/inet_diag.c:1396 [inline]\n inet_diag_rcv_msg_compat+0x2a6/0x530 net/ipv4/inet_diag.c:1426\n sock_diag_rcv_msg+0x23d/0x740 net/core/sock_diag.c:282\n\nCPU: 1 PID: 8888 Comm: syz-executor.6 Not tainted 6.10.0-rc4-00217-g35bb670d65fc #32\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.3-2.fc40 04/01/2014",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1078"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-42106"
		},
		{
			"cve":"CVE-2024-42119",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Skip finding free audio for unknown engine_id\n\n[WHY]\nENGINE_ID_UNKNOWN = -1 and can not be used as an array index. Plus, it\nalso means it is uninitialized and does not need free audio.\n\n[HOW]\nSkip and return NULL.\n\nThis fixes 2 OVERRUN issues reported by Coverity.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1078"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-42119"
		},
		{
			"cve":"CVE-2024-42124",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: qedf: Make qedf_execute_tmf() non-preemptible\n\nStop calling smp_processor_id() from preemptible code in\nqedf_execute_tmf90.  This results in BUG_ON() when running an RT kernel.\n\n[ 659.343280] BUG: using smp_processor_id() in preemptible [00000000] code: sg_reset/3646\n[ 659.343282] caller is qedf_execute_tmf+0x8b/0x360 [qedf]",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1078"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-42124"
		},
		{
			"cve":"CVE-2024-42137",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: qca: Fix BT enable failure again for QCA6390 after warm reboot\n\nCommit 272970be3dab (\"Bluetooth: hci_qca: Fix driver shutdown on closed\nserdev\") will cause below regression issue:\n\nBT can't be enabled after below steps:\ncold boot -> enable BT -> disable BT -> warm reboot -> BT enable failure\nif property enable-gpios is not configured within DT|ACPI for QCA6390.\n\nThe commit is to fix a use-after-free issue within qca_serdev_shutdown()\nby adding condition to avoid the serdev is flushed or wrote after closed\nbut also introduces this regression issue regarding above steps since the\nVSC is not sent to reset controller during warm reboot.\n\nFixed by sending the VSC to reset controller within qca_serdev_shutdown()\nonce BT was ever enabled, and the use-after-free issue is also fixed by\nthis change since the serdev is still opened before it is flushed or wrote.\n\nVerified by the reported machine Dell XPS 13 9310 laptop over below two\nkernel commits:\ncommit e00fc2700a3f (\"Bluetooth: btusb: Fix triggering coredump\nimplementation for QCA\") of bluetooth-next tree.\ncommit b23d98d46d28 (\"Bluetooth: btusb: Fix triggering coredump\nimplementation for QCA\") of linus mainline tree.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1078"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-42137"
		},
		{
			"cve":"CVE-2024-42143",
			"notes":[
				{
					"text":"Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1078"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.1,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-42143"
		},
		{
			"cve":"CVE-2024-42145",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nIB/core: Implement a limit on UMAD receive List\n\nThe existing behavior of ib_umad, which maintains received MAD\npackets in an unbounded list, poses a risk of uncontrolled growth.\nAs user-space applications extract packets from this list, the rate\nof extraction may not match the rate of incoming packets, leading\nto potential list overflow.\n\nTo address this, we introduce a limit to the size of the list. After\nconsidering typical scenarios, such as OpenSM processing, which can\nhandle approximately 100k packets per second, and the 1-second retry\ntimeout for most packets, we set the list size limit to 200k. Packets\nreceived beyond this limit are dropped, assuming they are likely timed\nout by the time they are handled by user-space.\n\nNotably, packets queued on the receive list due to reasons like\ntimed-out sends are preserved even when the list is full.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1078"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-42145"
		},
		{
			"cve":"CVE-2024-42148",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nbnx2x: Fix multiple UBSAN array-index-out-of-bounds\n\nFix UBSAN warnings that occur when using a system with 32 physical\ncpu cores or more, or when the user defines a number of Ethernet\nqueues greater than or equal to FP_SB_MAX_E1x using the num_queues\nmodule parameter.\n\nCurrently there is a read/write out of bounds that occurs on the array\n\"struct stats_query_entry query\" present inside the \"bnx2x_fw_stats_req\"\nstruct in \"drivers/net/ethernet/broadcom/bnx2x/bnx2x.h\".\nLooking at the definition of the \"struct stats_query_entry query\" array:\n\nstruct stats_query_entry query[FP_SB_MAX_E1x+\n         BNX2X_FIRST_QUEUE_QUERY_IDX];\n\nFP_SB_MAX_E1x is defined as the maximum number of fast path interrupts and\nhas a value of 16, while BNX2X_FIRST_QUEUE_QUERY_IDX has a value of 3\nmeaning the array has a total size of 19.\nSince accesses to \"struct stats_query_entry query\" are offset-ted by\nBNX2X_FIRST_QUEUE_QUERY_IDX, that means that the total number of Ethernet\nqueues should not exceed FP_SB_MAX_E1x (16). However one of these queues\nis reserved for FCOE and thus the number of Ethernet queues should be set\nto [FP_SB_MAX_E1x -1] (15) if FCOE is enabled or [FP_SB_MAX_E1x] (16) if\nit is not.\n\nThis is also described in a comment in the source code in\ndrivers/net/ethernet/broadcom/bnx2x/bnx2x.h just above the Macro definition\nof FP_SB_MAX_E1x. Below is the part of this explanation that it important\nfor this patch\n\n/*\n  * The total number of L2 queues, MSIX vectors and HW contexts (CIDs) is\n  * control by the number of fast-path status blocks supported by the\n  * device (HW/FW). Each fast-path status block (FP-SB) aka non-default\n  * status block represents an independent interrupts context that can\n  * serve a regular L2 networking queue. However special L2 queues such\n  * as the FCoE queue do not require a FP-SB and other components like\n  * the CNIC may consume FP-SB reducing the number of possible L2 queues\n  *\n  * If the maximum number of FP-SB available is X then:\n  * a. If CNIC is supported it consumes 1 FP-SB thus the max number of\n  *    regular L2 queues is Y=X-1\n  * b. In MF mode the actual number of L2 queues is Y= (X-1/MF_factor)\n  * c. If the FCoE L2 queue is supported the actual number of L2 queues\n  *    is Y+1\n  * d. The number of irqs (MSIX vectors) is either Y+1 (one extra for\n  *    slow-path interrupts) or Y+2 if CNIC is supported (one additional\n  *    FP interrupt context for the CNIC).\n  * e. The number of HW context (CID count) is always X or X+1 if FCoE\n  *    L2 queue is supported. The cid for the FCoE L2 queue is always X.\n  */\n\nHowever this driver also supports NICs that use the E2 controller which can\nhandle more queues due to having more FP-SB represented by FP_SB_MAX_E2.\nLooking at the commits when the E2 support was added, it was originally\nusing the E1x parameters: commit f2e0899f0f27 (\"bnx2x: Add 57712 support\").\nBack then FP_SB_MAX_E2 was set to 16 the same as E1x. However the driver\nwas later updated to take full advantage of the E2 instead of having it be\nlimited to the capabilities of the E1x. But as far as we can tell, the\narray \"stats_query_entry query\" was still limited to using the FP-SB\navailable to the E1x cards as part of an oversignt when the driver was\nupdated to take full advantage of the E2, and now with the driver being\naware of the greater queue size supported by E2 NICs, it causes the UBSAN\nwarnings seen in the stack traces below.\n\nThis patch increases the size of the \"stats_query_entry query\" array by\nreplacing FP_SB_MAX_E1x with FP_SB_MAX_E2 to be large enough to handle\nboth types of NICs.\n\nStack traces:\n\nUBSAN: array-index-out-of-bounds in\n       drivers/net/ethernet/broadcom/bnx2x/bnx2x_stats.c:1529:11\nindex 20 is out of range for type 'stats_query_entry [19]'\nCPU: 12 PID: 858 Comm: systemd-network Not tainted 6.9.0-060900rc7-generic\n\t     #202405052133\nHardware name: HP ProLiant DL360 Gen9/ProLiant DL360 \n---truncated---",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1078"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.8,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2024-42148"
		},
		{
			"cve":"CVE-2024-42244",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nUSB: serial: mos7840: fix crash on resume\n\nSince commit c49cfa917025 (\"USB: serial: use generic method if no\nalternative is provided in usb serial layer\"), USB serial core calls the\ngeneric resume implementation when the driver has not provided one.\n\nThis can trigger a crash on resume with mos7840 since support for\nmultiple read URBs was added back in 2011. Specifically, both port read\nURBs are now submitted on resume for open ports, but the context pointer\nof the second URB is left set to the core rather than mos7840 port\nstructure.\n\nFix this by implementing dedicated suspend and resume functions for\nmos7840.\n\nTested with Delock 87414 USB 2.0 to 4x serial adapter.\n\n[ johan: analyse crash and rewrite commit message; set busy flag on\n         resume; drop bulk-in check; drop unnecessary usb_kill_urb() ]",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1078"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-42244"
		},
		{
			"cve":"CVE-2024-42246",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nnet, sunrpc: Remap EPERM in case of connection failure in xs_tcp_setup_socket\n\nWhen using a BPF program on kernel_connect(), the call can return -EPERM. This\ncauses xs_tcp_setup_socket() to loop forever, filling up the syslog and causing\nthe kernel to potentially freeze up.\n\nNeil suggested:\n\n  This will propagate -EPERM up into other layers which might not be ready\n  to handle it. It might be safer to map EPERM to an error we would be more\n  likely to expect from the network system - such as ECONNREFUSED or ENETDOWN.\n\nECONNREFUSED as error seems reasonable. For programs setting a different error\ncan be out of reach (see handling in 4fbac77d2d09) in particular on kernels\nwhich do not have f10d05966196 (\"bpf: Make BPF_PROG_RUN_ARRAY return -err\ninstead of allow boolean\"), thus given that it is better to simply remap for\nconsistent behavior. UDP does handle EPERM in xs_udp_send_request().",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1078"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-42246"
		},
		{
			"cve":"CVE-2024-42281",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Fix a segment issue when downgrading gso_size\n\nLinearize the skb when downgrading gso_size because it may trigger a\nBUG_ON() later when the skb is segmented as described in [1,2].",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1078"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-42281"
		},
		{
			"cve":"CVE-2024-42288",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: qla2xxx: Fix for possible memory corruption\n\nInit Control Block is dereferenced incorrectly.  Correctly dereference ICB",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1078"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-42288"
		},
		{
			"cve":"CVE-2024-42304",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\next4: make sure the first directory block is not a hole\n\nThe syzbot constructs a directory that has no dirblock but is non-inline,\ni.e. the first directory block is a hole. And no errors are reported when\ncreating files in this directory in the following flow.\n\n    ext4_mknod\n     ...\n      ext4_add_entry\n        // Read block 0\n        ext4_read_dirblock(dir, block, DIRENT)\n          bh = ext4_bread(NULL, inode, block, 0)\n          if (!bh && (type == INDEX || type == DIRENT_HTREE))\n          // The first directory block is a hole\n          // But type == DIRENT, so no error is reported.\n\nAfter that, we get a directory block without '.' and '..' but with a valid\ndentry. This may cause some code that relies on dot or dotdot (such as\nmake_indexed_dir()) to crash.\n\nTherefore when ext4_read_dirblock() finds that the first directory block\nis a hole report that the filesystem is corrupted and return an error to\navoid loading corrupted data from disk causing something bad.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1078"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-42304"
		},
		{
			"cve":"CVE-2024-42310",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/gma500: fix null pointer dereference in cdv_intel_lvds_get_modes\n\nIn cdv_intel_lvds_get_modes(), the return value of drm_mode_duplicate()\nis assigned to mode, which will lead to a NULL pointer dereference on\nfailure of drm_mode_duplicate(). Add a check to avoid npd.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1078"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-42310"
		},
		{
			"cve":"CVE-2024-42318",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nlandlock: Don't lose track of restrictions on cred_transfer\n\nWhen a process' cred struct is replaced, this _almost_ always invokes\nthe cred_prepare LSM hook; but in one special case (when\nKEYCTL_SESSION_TO_PARENT updates the parent's credentials), the\ncred_transfer LSM hook is used instead.  Landlock only implements the\ncred_prepare hook, not cred_transfer, so KEYCTL_SESSION_TO_PARENT causes\nall information on Landlock restrictions to be lost.\n\nThis basically means that a process with the ability to use the fork()\nand keyctl() syscalls can get rid of all Landlock restrictions on\nitself.\n\nFix it by adding a cred_transfer hook that does the same thing as the\nexisting cred_prepare hook. (Implemented by having hook_cred_prepare()\ncall hook_cred_transfer() so that the two functions are less likely to\naccidentally diverge in the future.)",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1078"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-42318"
		},
		{
			"cve":"CVE-2024-43839",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nbna: adjust 'name' buf size of bna_tcb and bna_ccb structures\n\nTo have enough space to write all possible sprintf() args. Currently\n'name' size is 16, but the first '%s' specifier may already need at\nleast 16 characters, since 'bnad->netdev->name' is used there.\n\nFor '%d' specifiers, assume that they require:\n * 1 char for 'tx_id + tx_info->tcb[i]->id' sum, BNAD_MAX_TXQ_PER_TX is 8\n * 2 chars for 'rx_id + rx_info->rx_ctrl[i].ccb->id', BNAD_MAX_RXP_PER_RX\n   is 16\n\nAnd replace sprintf with snprintf.\n\nDetected using the static analysis tool - Svace.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1078"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.8,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2024-43839"
		},
		{
			"cve":"CVE-2024-43854",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nblock: initialize integrity buffer to zero before writing it to media\n\nMetadata added by bio_integrity_prep is using plain kmalloc, which leads\nto random kernel memory being written media.  For PI metadata this is\nlimited to the app tag that isn't used by kernel generated metadata,\nbut for non-PI metadata the entire buffer leaks kernel memory.\n\nFix this by adding the __GFP_ZERO flag to allocations for writes.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1078"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-43854"
		},
		{
			"cve":"CVE-2024-43879",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: cfg80211: handle 2x996 RU allocation in cfg80211_calculate_bitrate_he()\n\nCurrently NL80211_RATE_INFO_HE_RU_ALLOC_2x996 is not handled in\ncfg80211_calculate_bitrate_he(), leading to below warning:\n\nkernel: invalid HE MCS: bw:6, ru:6\nkernel: WARNING: CPU: 0 PID: 2312 at net/wireless/util.c:1501 cfg80211_calculate_bitrate_he+0x22b/0x270 [cfg80211]\n\nFix it by handling 2x996 RU allocation in the same way as 160 MHz bandwidth.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1078"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-43879"
		},
		{
			"cve":"CVE-2024-44944",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: ctnetlink: use helper function to calculate expect ID\n\nDelete expectation path is missing a call to the nf_expect_get_id()\nhelper function to calculate the expectation ID, otherwise LSB of the\nexpectation object address is leaked to userspace.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1078"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-44944"
		},
		{
			"cve":"CVE-2024-45006",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nxhci: Fix Panther point NULL pointer deref at full-speed re-enumeration\n\nre-enumerating full-speed devices after a failed address device command\ncan trigger a NULL pointer dereference.\n\nFull-speed devices may need to reconfigure the endpoint 0 Max Packet Size\nvalue during enumeration. Usb core calls usb_ep0_reinit() in this case,\nwhich ends up calling xhci_configure_endpoint().\n\nOn Panther point xHC the xhci_configure_endpoint() function will\nadditionally check and reserve bandwidth in software. Other hosts do\nthis in hardware\n\nIf xHC address device command fails then a new xhci_virt_device structure\nis allocated as part of re-enabling the slot, but the bandwidth table\npointers are not set up properly here.\nThis triggers the NULL pointer dereference the next time usb_ep0_reinit()\nis called and xhci_configure_endpoint() tries to check and reserve\nbandwidth\n\n[46710.713538] usb 3-1: new full-speed USB device number 5 using xhci_hcd\n[46710.713699] usb 3-1: Device not responding to setup address.\n[46710.917684] usb 3-1: Device not responding to setup address.\n[46711.125536] usb 3-1: device not accepting address 5, error -71\n[46711.125594] BUG: kernel NULL pointer dereference, address: 0000000000000008\n[46711.125600] #PF: supervisor read access in kernel mode\n[46711.125603] #PF: error_code(0x0000) - not-present page\n[46711.125606] PGD 0 P4D 0\n[46711.125610] Oops: Oops: 0000 [#1] PREEMPT SMP PTI\n[46711.125615] CPU: 1 PID: 25760 Comm: kworker/1:2 Not tainted 6.10.3_2 #1\n[46711.125620] Hardware name: Gigabyte Technology Co., Ltd.\n[46711.125623] Workqueue: usb_hub_wq hub_event [usbcore]\n[46711.125668] RIP: 0010:xhci_reserve_bandwidth (drivers/usb/host/xhci.c\n\nFix this by making sure bandwidth table pointers are set up correctly\nafter a failed address device command, and additionally by avoiding\nchecking for bandwidth in cases like this where no actual endpoints are\nadded or removed, i.e. only context for default control endpoint 0 is\nevaluated.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1078"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-45006"
		},
		{
			"cve":"CVE-2024-46707",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nKVM: arm64: Make ICC_*SGI*_EL1 undef in the absence of a vGICv3\n\nOn a system with a GICv3, if a guest hasn't been configured with\nGICv3 and that the host is not capable of GICv2 emulation,\na write to any of the ICC_*SGI*_EL1 registers is trapped to EL2.\n\nWe therefore try to emulate the SGI access, only to hit a NULL\npointer as no private interrupt is allocated (no GIC, remember?).\n\nThe obvious fix is to give the guest what it deserves, in the\nshape of a UNDEF exception.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1078"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-46707"
		},
		{
			"cve":"CVE-2024-46770",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nice: Add netif_device_attach/detach into PF reset flow\n\nEthtool callbacks can be executed while reset is in progress and try to\naccess deleted resources, e.g. getting coalesce settings can result in a\nNULL pointer dereference seen below.\n\nReproduction steps:\nOnce the driver is fully initialized, trigger reset:\n\t# echo 1 > /sys/class/net/<interface>/device/reset\nwhen reset is in progress try to get coalesce settings using ethtool:\n\t# ethtool -c <interface>\n\nBUG: kernel NULL pointer dereference, address: 0000000000000020\nPGD 0 P4D 0\nOops: Oops: 0000 [#1] PREEMPT SMP PTI\nCPU: 11 PID: 19713 Comm: ethtool Tainted: G S                 6.10.0-rc7+ #7\nRIP: 0010:ice_get_q_coalesce+0x2e/0xa0 [ice]\nRSP: 0018:ffffbab1e9bcf6a8 EFLAGS: 00010206\nRAX: 000000000000000c RBX: ffff94512305b028 RCX: 0000000000000000\nRDX: 0000000000000000 RSI: ffff9451c3f2e588 RDI: ffff9451c3f2e588\nRBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000\nR10: ffff9451c3f2e580 R11: 000000000000001f R12: ffff945121fa9000\nR13: ffffbab1e9bcf760 R14: 0000000000000013 R15: ffffffff9e65dd40\nFS:  00007faee5fbe740(0000) GS:ffff94546fd80000(0000) knlGS:0000000000000000\nCS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000000000000020 CR3: 0000000106c2e005 CR4: 00000000001706f0\nCall Trace:\n<TASK>\nice_get_coalesce+0x17/0x30 [ice]\ncoalesce_prepare_data+0x61/0x80\nethnl_default_doit+0xde/0x340\ngenl_family_rcv_msg_doit+0xf2/0x150\ngenl_rcv_msg+0x1b3/0x2c0\nnetlink_rcv_skb+0x5b/0x110\ngenl_rcv+0x28/0x40\nnetlink_unicast+0x19c/0x290\nnetlink_sendmsg+0x222/0x490\n__sys_sendto+0x1df/0x1f0\n__x64_sys_sendto+0x24/0x30\ndo_syscall_64+0x82/0x160\nentry_SYSCALL_64_after_hwframe+0x76/0x7e\nRIP: 0033:0x7faee60d8e27\n\nCalling netif_device_detach() before reset makes the net core not call\nthe driver when ethtool command is issued, the attempt to execute an\nethtool command during reset will result in the following message:\n\n    netlink error: No such device\n\ninstead of NULL pointer dereference. Once reset is done and\nice_rebuild() is executing, the netif_device_attach() is called to allow\nfor ethtool operations to occur again in a safe manner.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1078"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-46770"
		},
		{
			"cve":"CVE-2024-46828",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nsched: sch_cake: fix bulk flow accounting logic for host fairness\n\nIn sch_cake, we keep track of the count of active bulk flows per host,\nwhen running in dst/src host fairness mode, which is used as the\nround-robin weight when iterating through flows. The count of active\nbulk flows is updated whenever a flow changes state.\n\nThis has a peculiar interaction with the hash collision handling: when a\nhash collision occurs (after the set-associative hashing), the state of\nthe hash bucket is simply updated to match the new packet that collided,\nand if host fairness is enabled, that also means assigning new per-host\nstate to the flow. For this reason, the bulk flow counters of the\nhost(s) assigned to the flow are decremented, before new state is\nassigned (and the counters, which may not belong to the same host\nanymore, are incremented again).\n\nBack when this code was introduced, the host fairness mode was always\nenabled, so the decrement was unconditional. When the configuration\nflags were introduced the *increment* was made conditional, but\nthe *decrement* was not. Which of course can lead to a spurious\ndecrement (and associated wrap-around to U16_MAX).\n\nAFAICT, when host fairness is disabled, the decrement and wrap-around\nhappens as soon as a hash collision occurs (which is not that common in\nitself, due to the set-associative hashing). However, in most cases this\nis harmless, as the value is only used when host fairness mode is\nenabled. So in order to trigger an array overflow, sch_cake has to first\nbe configured with host fairness disabled, and while running in this\nmode, a hash collision has to occur to cause the overflow. Then, the\nqdisc has to be reconfigured to enable host fairness, which leads to the\narray out-of-bounds because the wrapped-around value is retained and\nused as an array index. It seems that syzbot managed to trigger this,\nwhich is quite impressive in its own right.\n\nThis patch fixes the issue by introducing the same conditional check on\ndecrement as is used on increment.\n\nThe original bug predates the upstreaming of cake, but the commit listed\nin the Fixes tag touched that code, meaning that this patch won't apply\nbefore that.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1078"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.8,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2024-46828"
		},
		{
			"cve":"CVE-2024-46848",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nperf/x86/intel: Limit the period on Haswell\n\nRunning the ltp test cve-2015-3290 concurrently reports the following\nwarnings.\n\nperfevents: irq loop stuck!\n  WARNING: CPU: 31 PID: 32438 at arch/x86/events/intel/core.c:3174\n  intel_pmu_handle_irq+0x285/0x370\n  Call Trace:\n   <NMI>\n   ? __warn+0xa4/0x220\n   ? intel_pmu_handle_irq+0x285/0x370\n   ? __report_bug+0x123/0x130\n   ? intel_pmu_handle_irq+0x285/0x370\n   ? __report_bug+0x123/0x130\n   ? intel_pmu_handle_irq+0x285/0x370\n   ? report_bug+0x3e/0xa0\n   ? handle_bug+0x3c/0x70\n   ? exc_invalid_op+0x18/0x50\n   ? asm_exc_invalid_op+0x1a/0x20\n   ? irq_work_claim+0x1e/0x40\n   ? intel_pmu_handle_irq+0x285/0x370\n   perf_event_nmi_handler+0x3d/0x60\n   nmi_handle+0x104/0x330\n\nThanks to Thomas Gleixner's analysis, the issue is caused by the low\ninitial period (1) of the frequency estimation algorithm, which triggers\nthe defects of the HW, specifically erratum HSW11 and HSW143. (For the\ndetails, please refer https://lore.kernel.org/lkml/87plq9l5d2.ffs@tglx/)\n\nThe HSW11 requires a period larger than 100 for the INST_RETIRED.ALL\nevent, but the initial period in the freq mode is 1. The erratum is the\nsame as the BDM11, which has been supported in the kernel. A minimum\nperiod of 128 is enforced as well on HSW.\n\nHSW143 is regarding that the fixed counter 1 may overcount 32 with the\nHyper-Threading is enabled. However, based on the test, the hardware\nhas more issues than it tells. Besides the fixed counter 1, the message\n'interrupt took too long' can be observed on any counter which was armed\nwith a period < 32 and two events expired in the same NMI. A minimum\nperiod of 32 is enforced for the rest of the events.\nThe recommended workaround code of the HSW143 is not implemented.\nBecause it only addresses the issue for the fixed counter. It brings\nextra overhead through extra MSR writing. No related overcounting issue\nhas been reported so far.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1078"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-46848"
		},
		{
			"cve":"CVE-2024-47670",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nocfs2: add bounds checking to ocfs2_xattr_find_entry()\n\nAdd a paranoia check to make sure it doesn't stray beyond valid memory\nregion containing ocfs2 xattr entries when scanning for a match.  It will\nprevent out-of-bound access in case of crafted images.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1078"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.8,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2024-47670"
		},
		{
			"cve":"CVE-2024-49938",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: ath9k_htc: Use __skb_set_length() for resetting urb before resubmit\n\nSyzbot points out that skb_trim() has a sanity check on the existing length of\nthe skb, which can be uninitialised in some error paths. The intent here is\nclearly just to reset the length to zero before resubmitting, so switch to\ncalling __skb_set_length(skb, 0) directly. In addition, __skb_set_length()\nalready contains a call to skb_reset_tail_pointer(), so remove the redundant\ncall.\n\nThe syzbot report came from ath9k_hif_usb_reg_in_cb(), but there's a similar\nusage of skb_trim() in ath9k_hif_usb_rx_cb(), change both while we're at it.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1078"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-49938"
		},
		{
			"cve":"CVE-2024-49944",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nsctp: set sk_state back to CLOSED if autobind fails in sctp_listen_start\n\nIn sctp_listen_start() invoked by sctp_inet_listen(), it should set the\nsk_state back to CLOSED if sctp_autobind() fails due to whatever reason.\n\nOtherwise, next time when calling sctp_inet_listen(), if sctp_sk(sk)->reuse\nis already set via setsockopt(SCTP_REUSE_PORT), sctp_sk(sk)->bind_hash will\nbe dereferenced as sk_state is LISTENING, which causes a crash as bind_hash\nis NULL.\n\n  KASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007]\n  RIP: 0010:sctp_inet_listen+0x7f0/0xa20 net/sctp/socket.c:8617\n  Call Trace:\n   <TASK>\n   __sys_listen_socket net/socket.c:1883 [inline]\n   __sys_listen+0x1b7/0x230 net/socket.c:1894\n   __do_sys_listen net/socket.c:1902 [inline]",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1078"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-49944"
		},
		{
			"cve":"CVE-2024-49952",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nf_tables: prevent nf_skb_duplicated corruption\n\nsyzbot found that nf_dup_ipv4() or nf_dup_ipv6() could write\nper-cpu variable nf_skb_duplicated in an unsafe way [1].\n\nDisabling preemption as hinted by the splat is not enough,\nwe have to disable soft interrupts as well.\n\n[1]\nBUG: using __this_cpu_write() in preemptible [00000000] code: syz.4.282/6316\n caller is nf_dup_ipv4+0x651/0x8f0 net/ipv4/netfilter/nf_dup_ipv4.c:87\nCPU: 0 UID: 0 PID: 6316 Comm: syz.4.282 Not tainted 6.11.0-rc7-syzkaller-00104-g7052622fccb1 #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024\nCall Trace:\n <TASK>\n  __dump_stack lib/dump_stack.c:93 [inline]\n  dump_stack_lvl+0x241/0x360 lib/dump_stack.c:119\n  check_preemption_disabled+0x10e/0x120 lib/smp_processor_id.c:49\n  nf_dup_ipv4+0x651/0x8f0 net/ipv4/netfilter/nf_dup_ipv4.c:87\n  nft_dup_ipv4_eval+0x1db/0x300 net/ipv4/netfilter/nft_dup_ipv4.c:30\n  expr_call_ops_eval net/netfilter/nf_tables_core.c:240 [inline]\n  nft_do_chain+0x4ad/0x1da0 net/netfilter/nf_tables_core.c:288\n  nft_do_chain_ipv4+0x202/0x320 net/netfilter/nft_chain_filter.c:23\n  nf_hook_entry_hookfn include/linux/netfilter.h:154 [inline]\n  nf_hook_slow+0xc3/0x220 net/netfilter/core.c:626\n  nf_hook+0x2c4/0x450 include/linux/netfilter.h:269\n  NF_HOOK_COND include/linux/netfilter.h:302 [inline]\n  ip_output+0x185/0x230 net/ipv4/ip_output.c:433\n  ip_local_out net/ipv4/ip_output.c:129 [inline]\n  ip_send_skb+0x74/0x100 net/ipv4/ip_output.c:1495\n  udp_send_skb+0xacf/0x1650 net/ipv4/udp.c:981\n  udp_sendmsg+0x1c21/0x2a60 net/ipv4/udp.c:1269\n  sock_sendmsg_nosec net/socket.c:730 [inline]\n  __sock_sendmsg+0x1a6/0x270 net/socket.c:745\n  ____sys_sendmsg+0x525/0x7d0 net/socket.c:2597\n  ___sys_sendmsg net/socket.c:2651 [inline]\n  __sys_sendmmsg+0x3b2/0x740 net/socket.c:2737\n  __do_sys_sendmmsg net/socket.c:2766 [inline]\n  __se_sys_sendmmsg net/socket.c:2763 [inline]\n  __x64_sys_sendmmsg+0xa0/0xb0 net/socket.c:2763\n  do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n  do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\nRIP: 0033:0x7f4ce4f7def9\nCode: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48\nRSP: 002b:00007f4ce5d4a038 EFLAGS: 00000246 ORIG_RAX: 0000000000000133\nRAX: ffffffffffffffda RBX: 00007f4ce5135f80 RCX: 00007f4ce4f7def9\nRDX: 0000000000000001 RSI: 0000000020005d40 RDI: 0000000000000006\nRBP: 00007f4ce4ff0b76 R08: 0000000000000000 R09: 0000000000000000\nR10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000\nR13: 0000000000000000 R14: 00007f4ce5135f80 R15: 00007ffd4cbc6d68\n </TASK>",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1078"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-49952"
		},
		{
			"cve":"CVE-2024-49959",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\njbd2: stop waiting for space when jbd2_cleanup_journal_tail() returns error\n\nIn __jbd2_log_wait_for_space(), we might call jbd2_cleanup_journal_tail()\nto recover some journal space. But if an error occurs while executing\njbd2_cleanup_journal_tail() (e.g., an EIO), we don't stop waiting for free\nspace right away, we try other branches, and if j_committing_transaction\nis NULL (i.e., the tid is 0), we will get the following complain:\n\n============================================\nJBD2: I/O error when updating journal superblock for sdd-8.\n__jbd2_log_wait_for_space: needed 256 blocks and only had 217 space available\n__jbd2_log_wait_for_space: no way to get more journal space in sdd-8\n------------[ cut here ]------------\nWARNING: CPU: 2 PID: 139804 at fs/jbd2/checkpoint.c:109 __jbd2_log_wait_for_space+0x251/0x2e0\nModules linked in:\nCPU: 2 PID: 139804 Comm: kworker/u8:3 Not tainted 6.6.0+ #1\nRIP: 0010:__jbd2_log_wait_for_space+0x251/0x2e0\nCall Trace:\n <TASK>\n add_transaction_credits+0x5d1/0x5e0\n start_this_handle+0x1ef/0x6a0\n jbd2__journal_start+0x18b/0x340\n ext4_dirty_inode+0x5d/0xb0\n __mark_inode_dirty+0xe4/0x5d0\n generic_update_time+0x60/0x70\n[...]\n============================================\n\nSo only if jbd2_cleanup_journal_tail() returns 1, i.e., there is nothing to\nclean up at the moment, continue to try to reclaim free space in other ways.\n\nNote that this fix relies on commit 6f6a6fda2945 (\"jbd2: fix ocfs2 corrupt\nwhen updating journal superblock fails\") to make jbd2_cleanup_journal_tail\nreturn the correct error code.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1078"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-49959"
		},
		{
			"cve":"CVE-2024-49963",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nmailbox: bcm2835: Fix timeout during suspend mode\n\nDuring noirq suspend phase the Raspberry Pi power driver suffer of\nfirmware property timeouts. The reason is that the IRQ of the underlying\nBCM2835 mailbox is disabled and rpi_firmware_property_list() will always\nrun into a timeout [1].\n\nSince the VideoCore side isn't consider as a wakeup source, set the\nIRQF_NO_SUSPEND flag for the mailbox IRQ in order to keep it enabled\nduring suspend-resume cycle.\n\n[1]\nPM: late suspend of devices complete after 1.754 msecs\nWARNING: CPU: 0 PID: 438 at drivers/firmware/raspberrypi.c:128\n rpi_firmware_property_list+0x204/0x22c\nFirmware transaction 0x00028001 timeout\nModules linked in:\nCPU: 0 PID: 438 Comm: bash Tainted: G         C         6.9.3-dirty #17\nHardware name: BCM2835\nCall trace:\nunwind_backtrace from show_stack+0x18/0x1c\nshow_stack from dump_stack_lvl+0x34/0x44\ndump_stack_lvl from __warn+0x88/0xec\n__warn from warn_slowpath_fmt+0x7c/0xb0\nwarn_slowpath_fmt from rpi_firmware_property_list+0x204/0x22c\nrpi_firmware_property_list from rpi_firmware_property+0x68/0x8c\nrpi_firmware_property from rpi_firmware_set_power+0x54/0xc0\nrpi_firmware_set_power from _genpd_power_off+0xe4/0x148\n_genpd_power_off from genpd_sync_power_off+0x7c/0x11c\ngenpd_sync_power_off from genpd_finish_suspend+0xcc/0xe0\ngenpd_finish_suspend from dpm_run_callback+0x78/0xd0\ndpm_run_callback from device_suspend_noirq+0xc0/0x238\ndevice_suspend_noirq from dpm_suspend_noirq+0xb0/0x168\ndpm_suspend_noirq from suspend_devices_and_enter+0x1b8/0x5ac\nsuspend_devices_and_enter from pm_suspend+0x254/0x2e4\npm_suspend from state_store+0xa8/0xd4\nstate_store from kernfs_fop_write_iter+0x154/0x1a0\nkernfs_fop_write_iter from vfs_write+0x12c/0x184\nvfs_write from ksys_write+0x78/0xc0\nksys_write from ret_fast_syscall+0x0/0x54\nException stack(0xcc93dfa8 to 0xcc93dff0)\n[...]\nPM: noirq suspend of devices complete after 3095.584 msecs",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1078"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-49963"
		},
		{
			"cve":"CVE-2024-50073",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\ntty: n_gsm: Fix use-after-free in gsm_cleanup_mux\n\nBUG: KASAN: slab-use-after-free in gsm_cleanup_mux+0x77b/0x7b0\ndrivers/tty/n_gsm.c:3160 [n_gsm]\nRead of size 8 at addr ffff88815fe99c00 by task poc/3379\nCPU: 0 UID: 0 PID: 3379 Comm: poc Not tainted 6.11.0+ #56\nHardware name: VMware, Inc. VMware Virtual Platform/440BX\nDesktop Reference Platform, BIOS 6.00 11/12/2020\nCall Trace:\n <TASK>\n gsm_cleanup_mux+0x77b/0x7b0 drivers/tty/n_gsm.c:3160 [n_gsm]\n __pfx_gsm_cleanup_mux+0x10/0x10 drivers/tty/n_gsm.c:3124 [n_gsm]\n __pfx_sched_clock_cpu+0x10/0x10 kernel/sched/clock.c:389\n update_load_avg+0x1c1/0x27b0 kernel/sched/fair.c:4500\n __pfx_min_vruntime_cb_rotate+0x10/0x10 kernel/sched/fair.c:846\n __rb_insert_augmented+0x492/0xbf0 lib/rbtree.c:161\n gsmld_ioctl+0x395/0x1450 drivers/tty/n_gsm.c:3408 [n_gsm]\n _raw_spin_lock_irqsave+0x92/0xf0 arch/x86/include/asm/atomic.h:107\n __pfx_gsmld_ioctl+0x10/0x10 drivers/tty/n_gsm.c:3822 [n_gsm]\n ktime_get+0x5e/0x140 kernel/time/timekeeping.c:195\n ldsem_down_read+0x94/0x4e0 arch/x86/include/asm/atomic64_64.h:79\n __pfx_ldsem_down_read+0x10/0x10 drivers/tty/tty_ldsem.c:338\n __pfx_do_vfs_ioctl+0x10/0x10 fs/ioctl.c:805\n tty_ioctl+0x643/0x1100 drivers/tty/tty_io.c:2818\n\nAllocated by task 65:\n gsm_data_alloc.constprop.0+0x27/0x190 drivers/tty/n_gsm.c:926 [n_gsm]\n gsm_send+0x2c/0x580 drivers/tty/n_gsm.c:819 [n_gsm]\n gsm1_receive+0x547/0xad0 drivers/tty/n_gsm.c:3038 [n_gsm]\n gsmld_receive_buf+0x176/0x280 drivers/tty/n_gsm.c:3609 [n_gsm]\n tty_ldisc_receive_buf+0x101/0x1e0 drivers/tty/tty_buffer.c:391\n tty_port_default_receive_buf+0x61/0xa0 drivers/tty/tty_port.c:39\n flush_to_ldisc+0x1b0/0x750 drivers/tty/tty_buffer.c:445\n process_scheduled_works+0x2b0/0x10d0 kernel/workqueue.c:3229\n worker_thread+0x3dc/0x950 kernel/workqueue.c:3391\n kthread+0x2a3/0x370 kernel/kthread.c:389\n ret_from_fork+0x2d/0x70 arch/x86/kernel/process.c:147\n ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:257\n\nFreed by task 3367:\n kfree+0x126/0x420 mm/slub.c:4580\n gsm_cleanup_mux+0x36c/0x7b0 drivers/tty/n_gsm.c:3160 [n_gsm]\n gsmld_ioctl+0x395/0x1450 drivers/tty/n_gsm.c:3408 [n_gsm]\n tty_ioctl+0x643/0x1100 drivers/tty/tty_io.c:2818\n\n[Analysis]\ngsm_msg on the tx_ctrl_list or tx_data_list of gsm_mux\ncan be freed by multi threads through ioctl,which leads\nto the occurrence of uaf. Protect it by gsm tx lock.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1078"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.8,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2024-50073"
		},
		{
			"cve":"CVE-2024-50133",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nLoongArch: Don't crash in stack_top() for tasks without vDSO\n\nNot all tasks have a vDSO mapped, for example kthreads never do. If such\na task ever ends up calling stack_top(), it will derefence the NULL vdso\npointer and crash.\n\nThis can for example happen when using kunit:\n\n\t[<9000000000203874>] stack_top+0x58/0xa8\n\t[<90000000002956cc>] arch_pick_mmap_layout+0x164/0x220\n\t[<90000000003c284c>] kunit_vm_mmap_init+0x108/0x12c\n\t[<90000000003c1fbc>] __kunit_add_resource+0x38/0x8c\n\t[<90000000003c2704>] kunit_vm_mmap+0x88/0xc8\n\t[<9000000000410b14>] usercopy_test_init+0xbc/0x25c\n\t[<90000000003c1db4>] kunit_try_run_case+0x5c/0x184\n\t[<90000000003c3d54>] kunit_generic_run_threadfn_adapter+0x24/0x48\n\t[<900000000022e4bc>] kthread+0xc8/0xd4\n\t[<9000000000200ce8>] ret_from_kernel_thread+0xc/0xa4",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1078"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-50133"
		},
		{
			"cve":"CVE-2024-50142",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nxfrm: validate new SA's prefixlen using SA family when sel.family is unset\n\nThis expands the validation introduced in commit 07bf7908950a (\"xfrm:\nValidate address prefix lengths in the xfrm selector.\")\n\nsyzbot created an SA with\n    usersa.sel.family = AF_UNSPEC\n    usersa.sel.prefixlen_s = 128\n    usersa.family = AF_INET\n\nBecause of the AF_UNSPEC selector, verify_newsa_info doesn't put\nlimits on prefixlen_{s,d}. But then copy_from_user_state sets\nx->sel.family to usersa.family (AF_INET). Do the same conversion in\nverify_newsa_info before validating prefixlen_{s,d}, since that's how\nprefixlen is going to be used later on.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1078"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-50142"
		},
		{
			"cve":"CVE-2024-50167",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nbe2net: fix potential memory leak in be_xmit()\n\nThe be_xmit() returns NETDEV_TX_OK without freeing skb\nin case of be_xmit_enqueue() fails, add dev_kfree_skb_any() to fix it.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1078"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-50167"
		},
		{
			"cve":"CVE-2024-50168",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sun3_82586: fix potential memory leak in sun3_82586_send_packet()\n\nThe sun3_82586_send_packet() returns NETDEV_TX_OK without freeing skb\nin case of skb->len being too long, add dev_kfree_skb() to fix it.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1078"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-50168"
		},
		{
			"cve":"CVE-2024-50251",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nft_payload: sanitize offset and length before calling skb_checksum()\n\nIf access to offset + length is larger than the skbuff length, then\nskb_checksum() triggers BUG_ON().\n\nskb_checksum() internally subtracts the length parameter while iterating\nover skbuff, BUG_ON(len) at the end of it checks that the expected\nlength to be included in the checksum calculation is fully consumed.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1078"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":6.2,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-50251"
		},
		{
			"cve":"CVE-2024-53050",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/i915/hdcp: Add encoder check in hdcp2_get_capability\n\nAdd encoder check in intel_hdcp2_get_capability to avoid\nnull pointer error.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1078"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-53050"
		},
		{
			"cve":"CVE-2024-53099",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Check validity of link->type in bpf_link_show_fdinfo()\n\nIf a newly-added link type doesn't invoke BPF_LINK_TYPE(), accessing\nbpf_link_type_strs[link->type] may result in an out-of-bounds access.\n\nTo spot such missed invocations early in the future, checking the\nvalidity of link->type in bpf_link_show_fdinfo() and emitting a warning\nwhen such invocations are missed.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1078"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.1,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2024-53099"
		},
		{
			"cve":"CVE-2024-53101",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nfs: Fix uninitialized value issue in from_kuid and from_kgid\n\nocfs2_setattr() uses attr->ia_mode, attr->ia_uid and attr->ia_gid in\na trace point even though ATTR_MODE, ATTR_UID and ATTR_GID aren't set.\n\nInitialize all fields of newattrs to avoid uninitialized variables, by\nchecking if ATTR_MODE, ATTR_UID, ATTR_GID are initialized, otherwise 0.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1078"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-53101"
		},
		{
			"cve":"CVE-2024-53128",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nsched/task_stack: fix object_is_on_stack() for KASAN tagged pointers\n\nWhen CONFIG_KASAN_SW_TAGS and CONFIG_KASAN_STACK are enabled, the\nobject_is_on_stack() function may produce incorrect results due to the\npresence of tags in the obj pointer, while the stack pointer does not have\ntags.  This discrepancy can lead to incorrect stack object detection and\nsubsequently trigger warnings if CONFIG_DEBUG_OBJECTS is also enabled.\n\nExample of the warning:\n\nODEBUG: object 3eff800082ea7bb0 is NOT on stack ffff800082ea0000, but annotated.\n------------[ cut here ]------------\nWARNING: CPU: 0 PID: 1 at lib/debugobjects.c:557 __debug_object_init+0x330/0x364\nModules linked in:\nCPU: 0 UID: 0 PID: 1 Comm: swapper/0 Not tainted 6.12.0-rc5 #4\nHardware name: linux,dummy-virt (DT)\npstate: 600000c5 (nZCv daIF -PAN -UAO -TCO -DIT -SSBS BTYPE=--)\npc : __debug_object_init+0x330/0x364\nlr : __debug_object_init+0x330/0x364\nsp : ffff800082ea7b40\nx29: ffff800082ea7b40 x28: 98ff0000c0164518 x27: 98ff0000c0164534\nx26: ffff800082d93ec8 x25: 0000000000000001 x24: 1cff0000c00172a0\nx23: 0000000000000000 x22: ffff800082d93ed0 x21: ffff800081a24418\nx20: 3eff800082ea7bb0 x19: efff800000000000 x18: 0000000000000000\nx17: 00000000000000ff x16: 0000000000000047 x15: 206b63617473206e\nx14: 0000000000000018 x13: ffff800082ea7780 x12: 0ffff800082ea78e\nx11: 0ffff800082ea790 x10: 0ffff800082ea79d x9 : 34d77febe173e800\nx8 : 34d77febe173e800 x7 : 0000000000000001 x6 : 0000000000000001\nx5 : feff800082ea74b8 x4 : ffff800082870a90 x3 : ffff80008018d3c4\nx2 : 0000000000000001 x1 : ffff800082858810 x0 : 0000000000000050\nCall trace:\n __debug_object_init+0x330/0x364\n debug_object_init_on_stack+0x30/0x3c\n schedule_hrtimeout_range_clock+0xac/0x26c\n schedule_hrtimeout+0x1c/0x30\n wait_task_inactive+0x1d4/0x25c\n kthread_bind_mask+0x28/0x98\n init_rescuer+0x1e8/0x280\n workqueue_init+0x1a0/0x3cc\n kernel_init_freeable+0x118/0x200\n kernel_init+0x28/0x1f0\n ret_from_fork+0x10/0x20\n---[ end trace 0000000000000000 ]---\nODEBUG: object 3eff800082ea7bb0 is NOT on stack ffff800082ea0000, but annotated.\n------------[ cut here ]------------",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1078"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-53128"
		},
		{
			"cve":"CVE-2024-53150",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: usb-audio: Fix out of bounds reads when finding clock sources\n\nThe current USB-audio driver code doesn't check bLength of each\ndescriptor at traversing for clock descriptors.  That is, when a\ndevice provides a bogus descriptor with a shorter bLength, the driver\nmight hit out-of-bounds reads.\n\nFor addressing it, this patch adds sanity checks to the validator\nfunctions for the clock descriptor traversal.  When the descriptor\nlength is shorter than expected, it's skipped in the loop.\n\nFor the clock source and clock multiplier descriptors, we can just\ncheck bLength against the sizeof() of each descriptor type.\nOTOH, the clock selector descriptor of UAC2 and UAC3 has an array\nof bNrInPins elements and two more fields at its tail, hence those\nhave to be checked in addition to the sizeof() check.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1078"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.1,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2024-53150"
		},
		{
			"cve":"CVE-2024-53155",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nocfs2: fix uninitialized value in ocfs2_file_read_iter()\n\nSyzbot has reported the following KMSAN splat:\n\nBUG: KMSAN: uninit-value in ocfs2_file_read_iter+0x9a4/0xf80\n ocfs2_file_read_iter+0x9a4/0xf80\n __io_read+0x8d4/0x20f0\n io_read+0x3e/0xf0\n io_issue_sqe+0x42b/0x22c0\n io_wq_submit_work+0xaf9/0xdc0\n io_worker_handle_work+0xd13/0x2110\n io_wq_worker+0x447/0x1410\n ret_from_fork+0x6f/0x90\n ret_from_fork_asm+0x1a/0x30\n\nUninit was created at:\n __alloc_pages_noprof+0x9a7/0xe00\n alloc_pages_mpol_noprof+0x299/0x990\n alloc_pages_noprof+0x1bf/0x1e0\n allocate_slab+0x33a/0x1250\n ___slab_alloc+0x12ef/0x35e0\n kmem_cache_alloc_bulk_noprof+0x486/0x1330\n __io_alloc_req_refill+0x84/0x560\n io_submit_sqes+0x172f/0x2f30\n __se_sys_io_uring_enter+0x406/0x41c0\n __x64_sys_io_uring_enter+0x11f/0x1a0\n x64_sys_call+0x2b54/0x3ba0\n do_syscall_64+0xcd/0x1e0\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n\nSince an instance of 'struct kiocb' may be passed from the block layer\nwith 'private' field uninitialized, introduce 'ocfs2_iocb_init_rw_locked()'\nand use it from where 'ocfs2_dio_end_io()' might take care, i.e. in\n'ocfs2_file_read_iter()' and 'ocfs2_file_write_iter()'.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1078"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.1,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2024-53155"
		},
		{
			"cve":"CVE-2024-53157",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nfirmware: arm_scpi: Check the DVFS OPP count returned by the firmware\n\nFix a kernel crash with the below call trace when the SCPI firmware\nreturns OPP count of zero.\n\ndvfs_info.opp_count may be zero on some platforms during the reboot\ntest, and the kernel will crash after dereferencing the pointer to\nkcalloc(info->count, sizeof(*opp), GFP_KERNEL).\n\n  |  Unable to handle kernel NULL pointer dereference at virtual address 0000000000000028\n  |  Mem abort info:\n  |    ESR = 0x96000004\n  |    Exception class = DABT (current EL), IL = 32 bits\n  |    SET = 0, FnV = 0\n  |    EA = 0, S1PTW = 0\n  |  Data abort info:\n  |    ISV = 0, ISS = 0x00000004\n  |    CM = 0, WnR = 0\n  |  user pgtable: 4k pages, 48-bit VAs, pgdp = 00000000faefa08c\n  |  [0000000000000028] pgd=0000000000000000\n  |  Internal error: Oops: 96000004 [#1] SMP\n  |  scpi-hwmon: probe of PHYT000D:00 failed with error -110\n  |  Process systemd-udevd (pid: 1701, stack limit = 0x00000000aaede86c)\n  |  CPU: 2 PID: 1701 Comm: systemd-udevd Not tainted 4.19.90+ #1\n  |  Hardware name: PHYTIUM LTD Phytium FT2000/4/Phytium FT2000/4, BIOS\n  |  pstate: 60000005 (nZCv daif -PAN -UAO)\n  |  pc : scpi_dvfs_recalc_rate+0x40/0x58 [clk_scpi]\n  |  lr : clk_register+0x438/0x720\n  |  Call trace:\n  |   scpi_dvfs_recalc_rate+0x40/0x58 [clk_scpi]\n  |   devm_clk_hw_register+0x50/0xa0\n  |   scpi_clk_ops_init.isra.2+0xa0/0x138 [clk_scpi]\n  |   scpi_clocks_probe+0x528/0x70c [clk_scpi]\n  |   platform_drv_probe+0x58/0xa8\n  |   really_probe+0x260/0x3d0\n  |   driver_probe_device+0x12c/0x148\n  |   device_driver_attach+0x74/0x98\n  |   __driver_attach+0xb4/0xe8\n  |   bus_for_each_dev+0x88/0xe0\n  |   driver_attach+0x30/0x40\n  |   bus_add_driver+0x178/0x2b0\n  |   driver_register+0x64/0x118\n  |   __platform_driver_register+0x54/0x60\n  |   scpi_clocks_driver_init+0x24/0x1000 [clk_scpi]\n  |   do_one_initcall+0x54/0x220\n  |   do_init_module+0x54/0x1c8\n  |   load_module+0x14a4/0x1668\n  |   __se_sys_finit_module+0xf8/0x110\n  |   __arm64_sys_finit_module+0x24/0x30\n  |   el0_svc_common+0x78/0x170\n  |   el0_svc_handler+0x38/0x78\n  |   el0_svc+0x8/0x340\n  |  Code: 937d7c00 a94153f3 a8c27bfd f9400421 (b8606820)\n  |  ---[ end trace 06feb22469d89fa8 ]---\n  |  Kernel panic - not syncing: Fatal exception\n  |  SMP: stopping secondary CPUs\n  |  Kernel Offset: disabled\n  |  CPU features: 0x10,a0002008\n  |  Memory Limit: none",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1078"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-53157"
		},
		{
			"cve":"CVE-2024-53158",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nsoc: qcom: geni-se: fix array underflow in geni_se_clk_tbl_get()\n\nThis loop is supposed to break if the frequency returned from\nclk_round_rate() is the same as on the previous iteration.  However,\nthat check doesn't make sense on the first iteration through the loop.\nIt leads to reading before the start of these->clk_perf_tbl[] array.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1078"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"LOW",
						"baseScore":3.9,
						"vectorString":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Low",
					"category":"impact"
				}
			],
			"title":"CVE-2024-53158"
		},
		{
			"cve":"CVE-2024-53159",
			"notes":[
				{
					"text":"Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1078"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"LOW",
						"baseScore":3.9,
						"vectorString":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Low",
					"category":"impact"
				}
			],
			"title":"CVE-2024-53159"
		},
		{
			"cve":"CVE-2024-53160",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nrcu/kvfree: Fix data-race in __mod_timer / kvfree_call_rcu\n\nKCSAN reports a data race when access the krcp->monitor_work.timer.expires\nvariable in the schedule_delayed_monitor_work() function:\n\n<snip>\nBUG: KCSAN: data-race in __mod_timer / kvfree_call_rcu\n\nread to 0xffff888237d1cce8 of 8 bytes by task 10149 on cpu 1:\n schedule_delayed_monitor_work kernel/rcu/tree.c:3520 [inline]\n kvfree_call_rcu+0x3b8/0x510 kernel/rcu/tree.c:3839\n trie_update_elem+0x47c/0x620 kernel/bpf/lpm_trie.c:441\n bpf_map_update_value+0x324/0x350 kernel/bpf/syscall.c:203\n generic_map_update_batch+0x401/0x520 kernel/bpf/syscall.c:1849\n bpf_map_do_batch+0x28c/0x3f0 kernel/bpf/syscall.c:5143\n __sys_bpf+0x2e5/0x7a0\n __do_sys_bpf kernel/bpf/syscall.c:5741 [inline]\n __se_sys_bpf kernel/bpf/syscall.c:5739 [inline]\n __x64_sys_bpf+0x43/0x50 kernel/bpf/syscall.c:5739\n x64_sys_call+0x2625/0x2d60 arch/x86/include/generated/asm/syscalls_64.h:322\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0xc9/0x1c0 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n\nwrite to 0xffff888237d1cce8 of 8 bytes by task 56 on cpu 0:\n __mod_timer+0x578/0x7f0 kernel/time/timer.c:1173\n add_timer_global+0x51/0x70 kernel/time/timer.c:1330\n __queue_delayed_work+0x127/0x1a0 kernel/workqueue.c:2523\n queue_delayed_work_on+0xdf/0x190 kernel/workqueue.c:2552\n queue_delayed_work include/linux/workqueue.h:677 [inline]\n schedule_delayed_monitor_work kernel/rcu/tree.c:3525 [inline]\n kfree_rcu_monitor+0x5e8/0x660 kernel/rcu/tree.c:3643\n process_one_work kernel/workqueue.c:3229 [inline]\n process_scheduled_works+0x483/0x9a0 kernel/workqueue.c:3310\n worker_thread+0x51d/0x6f0 kernel/workqueue.c:3391\n kthread+0x1d1/0x210 kernel/kthread.c:389\n ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:147\n ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244\n\nReported by Kernel Concurrency Sanitizer on:\nCPU: 0 UID: 0 PID: 56 Comm: kworker/u8:4 Not tainted 6.12.0-rc2-syzkaller-00050-g5b7c893ed5ed #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024\nWorkqueue: events_unbound kfree_rcu_monitor\n<snip>\n\nkfree_rcu_monitor() rearms the work if a \"krcp\" has to be still\noffloaded and this is done without holding krcp->lock, whereas\nthe kvfree_call_rcu() holds it.\n\nFix it by acquiring the \"krcp->lock\" for kfree_rcu_monitor() so\nboth functions do not race anymore.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1078"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"LOW",
						"baseScore":3.9,
						"vectorString":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Low",
					"category":"impact"
				}
			],
			"title":"CVE-2024-53160"
		},
		{
			"cve":"CVE-2024-53171",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nubifs: authentication: Fix use-after-free in ubifs_tnc_end_commit\n\nAfter an insertion in TNC, the tree might split and cause a node to\nchange its `znode->parent`. A further deletion of other nodes in the\ntree (which also could free the nodes), the aforementioned node's\n`znode->cparent` could still point to a freed node. This\n`znode->cparent` may not be updated when getting nodes to commit in\n`ubifs_tnc_start_commit()`. This could then trigger a use-after-free\nwhen accessing the `znode->cparent` in `write_index()` in\n`ubifs_tnc_end_commit()`.\n\nThis can be triggered by running\n\n  rm -f /etc/test-file.bin\n  dd if=/dev/urandom of=/etc/test-file.bin bs=1M count=60 conv=fsync\n\nin a loop, and with `CONFIG_UBIFS_FS_AUTHENTICATION`. KASAN then\nreports:\n\n  BUG: KASAN: use-after-free in ubifs_tnc_end_commit+0xa5c/0x1950\n  Write of size 32 at addr ffffff800a3af86c by task ubifs_bgt0_20/153\n\n  Call trace:\n   dump_backtrace+0x0/0x340\n   show_stack+0x18/0x24\n   dump_stack_lvl+0x9c/0xbc\n   print_address_description.constprop.0+0x74/0x2b0\n   kasan_report+0x1d8/0x1f0\n   kasan_check_range+0xf8/0x1a0\n   memcpy+0x84/0xf4\n   ubifs_tnc_end_commit+0xa5c/0x1950\n   do_commit+0x4e0/0x1340\n   ubifs_bg_thread+0x234/0x2e0\n   kthread+0x36c/0x410\n   ret_from_fork+0x10/0x20\n\n  Allocated by task 401:\n   kasan_save_stack+0x38/0x70\n   __kasan_kmalloc+0x8c/0xd0\n   __kmalloc+0x34c/0x5bc\n   tnc_insert+0x140/0x16a4\n   ubifs_tnc_add+0x370/0x52c\n   ubifs_jnl_write_data+0x5d8/0x870\n   do_writepage+0x36c/0x510\n   ubifs_writepage+0x190/0x4dc\n   __writepage+0x58/0x154\n   write_cache_pages+0x394/0x830\n   do_writepages+0x1f0/0x5b0\n   filemap_fdatawrite_wbc+0x170/0x25c\n   file_write_and_wait_range+0x140/0x190\n   ubifs_fsync+0xe8/0x290\n   vfs_fsync_range+0xc0/0x1e4\n   do_fsync+0x40/0x90\n   __arm64_sys_fsync+0x34/0x50\n   invoke_syscall.constprop.0+0xa8/0x260\n   do_el0_svc+0xc8/0x1f0\n   el0_svc+0x34/0x70\n   el0t_64_sync_handler+0x108/0x114\n   el0t_64_sync+0x1a4/0x1a8\n\n  Freed by task 403:\n   kasan_save_stack+0x38/0x70\n   kasan_set_track+0x28/0x40\n   kasan_set_free_info+0x28/0x4c\n   __kasan_slab_free+0xd4/0x13c\n   kfree+0xc4/0x3a0\n   tnc_delete+0x3f4/0xe40\n   ubifs_tnc_remove_range+0x368/0x73c\n   ubifs_tnc_remove_ino+0x29c/0x2e0\n   ubifs_jnl_delete_inode+0x150/0x260\n   ubifs_evict_inode+0x1d4/0x2e4\n   evict+0x1c8/0x450\n   iput+0x2a0/0x3c4\n   do_unlinkat+0x2cc/0x490\n   __arm64_sys_unlinkat+0x90/0x100\n   invoke_syscall.constprop.0+0xa8/0x260\n   do_el0_svc+0xc8/0x1f0\n   el0_svc+0x34/0x70\n   el0t_64_sync_handler+0x108/0x114\n   el0t_64_sync+0x1a4/0x1a8\n\nThe offending `memcpy()` in `ubifs_copy_hash()` has a use-after-free\nwhen a node becomes root in TNC but still has a `cparent` to an already\nfreed node. More specifically, consider the following TNC:\n\n         zroot\n         /\n        /\n      zp1\n      /\n     /\n    zn\n\nInserting a new node `zn_new` with a key smaller then `zn` will trigger\na split in `tnc_insert()` if `zp1` is full:\n\n         zroot\n         /   \\\n        /     \\\n      zp1     zp2\n      /         \\\n     /           \\\n  zn_new          zn\n\n`zn->parent` has now been moved to `zp2`, *but* `zn->cparent` still\npoints to `zp1`.\n\nNow, consider a removal of all the nodes _except_ `zn`. Just when\n`tnc_delete()` is about to delete `zroot` and `zp2`:\n\n         zroot\n             \\\n              \\\n              zp2\n                \\\n                 \\\n                 zn\n\n`zroot` and `zp2` get freed and the tree collapses:\n\n           zn\n\n`zn` now becomes the new `zroot`.\n\n`get_znodes_to_commit()` will now only find `zn`, the new `zroot`, and\n`write_index()` will check its `znode->cparent` that wrongly points to\nthe already freed `zp1`. `ubifs_copy_hash()` thus gets wrongly called\nwith `znode->cparent->zbranch[znode->iip].hash` that triggers the\nuse-after-free!\n\nFix this by explicitly setting `znode->cparent` to `NULL` in\n`get_znodes_to_commit()` for the root node. The search for the dirty\nnodes\n---truncated---",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1078"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.8,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2024-53171"
		},
		{
			"cve":"CVE-2024-53180",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: pcm: Add sanity NULL check for the default mmap fault handler\n\nA driver might allow the mmap access before initializing its\nruntime->dma_area properly.  Add a proper NULL check before passing to\nvirt_to_page() for avoiding a panic.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1078"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-53180"
		},
		{
			"cve":"CVE-2024-53187",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nio_uring: check for overflows in io_pin_pages\n\nWARNING: CPU: 0 PID: 5834 at io_uring/memmap.c:144 io_pin_pages+0x149/0x180 io_uring/memmap.c:144\nCPU: 0 UID: 0 PID: 5834 Comm: syz-executor825 Not tainted 6.12.0-next-20241118-syzkaller #0\nCall Trace:\n <TASK>\n __io_uaddr_map+0xfb/0x2d0 io_uring/memmap.c:183\n io_rings_map io_uring/io_uring.c:2611 [inline]\n io_allocate_scq_urings+0x1c0/0x650 io_uring/io_uring.c:3470\n io_uring_create+0x5b5/0xc00 io_uring/io_uring.c:3692\n io_uring_setup io_uring/io_uring.c:3781 [inline]\n ...\n </TASK>\n\nio_pin_pages()'s uaddr parameter came directly from the user and can be\ngarbage. Don't just add size to it as it can overflow.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1078"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-53187"
		},
		{
			"cve":"CVE-2024-53190",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: rtlwifi: Drastically reduce the attempts to read efuse in case of failures\n\nSyzkaller reported a hung task with uevent_show() on stack trace. That\nspecific issue was addressed by another commit [0], but even with that\nfix applied (for example, running v6.12-rc5) we face another type of hung\ntask that comes from the same reproducer [1]. By investigating that, we\ncould narrow it to the following path:\n\n(a) Syzkaller emulates a Realtek USB WiFi adapter using raw-gadget and\ndummy_hcd infrastructure.\n\n(b) During the probe of rtl8192cu, the driver ends-up performing an efuse\nread procedure (which is related to EEPROM load IIUC), and here lies the\nissue: the function read_efuse() calls read_efuse_byte() many times, as\nloop iterations depending on the efuse size (in our example, 512 in total).\n\nThis procedure for reading efuse bytes relies in a loop that performs an\nI/O read up to *10k* times in case of failures. We measured the time of\nthe loop inside read_efuse_byte() alone, and in this reproducer (which\ninvolves the dummy_hcd emulation layer), it takes 15 seconds each. As a\nconsequence, we have the driver stuck in its probe routine for big time,\nexposing a stack trace like below if we attempt to reboot the system, for\nexample:\n\ntask:kworker/0:3 state:D stack:0 pid:662 tgid:662 ppid:2 flags:0x00004000\nWorkqueue: usb_hub_wq hub_event\nCall Trace:\n __schedule+0xe22/0xeb6\n schedule_timeout+0xe7/0x132\n __wait_for_common+0xb5/0x12e\n usb_start_wait_urb+0xc5/0x1ef\n ? usb_alloc_urb+0x95/0xa4\n usb_control_msg+0xff/0x184\n _usbctrl_vendorreq_sync+0xa0/0x161\n _usb_read_sync+0xb3/0xc5\n read_efuse_byte+0x13c/0x146\n read_efuse+0x351/0x5f0\n efuse_read_all_map+0x42/0x52\n rtl_efuse_shadow_map_update+0x60/0xef\n rtl_get_hwinfo+0x5d/0x1c2\n rtl92cu_read_eeprom_info+0x10a/0x8d5\n ? rtl92c_read_chip_version+0x14f/0x17e\n rtl_usb_probe+0x323/0x851\n usb_probe_interface+0x278/0x34b\n really_probe+0x202/0x4a4\n __driver_probe_device+0x166/0x1b2\n driver_probe_device+0x2f/0xd8\n [...]\n\nWe propose hereby to drastically reduce the attempts of doing the I/O\nreads in case of failures, restricted to USB devices (given that\nthey're inherently slower than PCIe ones). By retrying up to 10 times\n(instead of 10000), we got reponsiveness in the reproducer, while seems\nreasonable to believe that there's no sane USB device implementation in\nthe field requiring this amount of retries at every I/O read in order\nto properly work. Based on that assumption, it'd be good to have it\nbackported to stable but maybe not since driver implementation (the 10k\nnumber comes from day 0), perhaps up to 6.x series makes sense.\n\n[0] Commit 15fffc6a5624 (\"driver core: Fix uevent_show() vs driver detach race\")\n\n[1] A note about that: this syzkaller report presents multiple reproducers\nthat differs by the type of emulated USB device. For this specific case,\ncheck the entry from 2024/08/08 06:23 in the list of crashes; the C repro\nis available at https://syzkaller.appspot.com/text?tag=ReproC&x=1521fc83980000.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1078"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-53190"
		},
		{
			"cve":"CVE-2024-53191",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: ath12k: fix warning when unbinding\n\nIf there is an error during some initialization related to firmware,\nthe buffers dp->tx_ring[i].tx_status are released.\nHowever this is released again when the device is unbinded (ath12k_pci),\nand we get:\nWARNING: CPU: 0 PID: 2098 at mm/slub.c:4689 free_large_kmalloc+0x4d/0x80\nCall Trace:\nfree_large_kmalloc\nath12k_dp_free\nath12k_core_deinit\nath12k_pci_remove\n...\n\nThe issue is always reproducible from a VM because the MSI addressing\ninitialization is failing.\n\nIn order to fix the issue, just set the buffers to NULL after releasing in\norder to avoid the double free.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1078"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"LOW",
						"baseScore":3.9,
						"vectorString":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Low",
					"category":"impact"
				}
			],
			"title":"CVE-2024-53191"
		},
		{
			"cve":"CVE-2024-53194",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nPCI: Fix use-after-free of slot->bus on hot remove\n\nDennis reports a boot crash on recent Lenovo laptops with a USB4 dock.\n\nSince commit 0fc70886569c (\"thunderbolt: Reset USB4 v2 host router\") and\ncommit 59a54c5f3dbd (\"thunderbolt: Reset topology created by the boot\nfirmware\"), USB4 v2 and v1 Host Routers are reset on probe of the\nthunderbolt driver.\n\nThe reset clears the Presence Detect State and Data Link Layer Link Active\nbits at the USB4 Host Router's Root Port and thus causes hot removal of the\ndock.\n\nThe crash occurs when pciehp is unbound from one of the dock's Downstream\nPorts:  pciehp creates a pci_slot on bind and destroys it on unbind.  The\npci_slot contains a pointer to the pci_bus below the Downstream Port, but\na reference on that pci_bus is never acquired.  The pci_bus is destroyed\nbefore the pci_slot, so a use-after-free ensues when pci_slot_release()\naccesses slot->bus.\n\nIn principle this should not happen because pci_stop_bus_device() unbinds\npciehp (and therefore destroys the pci_slot) before the pci_bus is\ndestroyed by pci_remove_bus_device().\n\nHowever the stacktrace provided by Dennis shows that pciehp is unbound from\npci_remove_bus_device() instead of pci_stop_bus_device().  To understand\nthe significance of this, one needs to know that the PCI core uses a two\nstep process to remove a portion of the hierarchy:  It first unbinds all\ndrivers in the sub-hierarchy in pci_stop_bus_device() and then actually\nremoves the devices in pci_remove_bus_device().  There is no precaution to\nprevent driver binding in-between pci_stop_bus_device() and\npci_remove_bus_device().\n\nIn Dennis' case, it seems removal of the hierarchy by pciehp races with\ndriver binding by pci_bus_add_devices().  pciehp is bound to the\nDownstream Port after pci_stop_bus_device() has run, so it is unbound by\npci_remove_bus_device() instead of pci_stop_bus_device().  Because the\npci_bus has already been destroyed at that point, accesses to it result in\na use-after-free.\n\nOne might conclude that driver binding needs to be prevented after\npci_stop_bus_device() has run.  However it seems risky that pci_slot points\nto pci_bus without holding a reference.  Solely relying on correct ordering\nof driver unbind versus pci_bus destruction is certainly not defensive\nprogramming.\n\nIf pci_slot has a need to access data in pci_bus, it ought to acquire a\nreference.  Amend pci_create_slot() accordingly.  Dennis reports that the\ncrash is not reproducible with this change.\n\nAbridged stacktrace:\n\n  pcieport 0000:00:07.0: PME: Signaling with IRQ 156\n  pcieport 0000:00:07.0: pciehp: Slot #12 AttnBtn- PwrCtrl- MRL- AttnInd- PwrInd- HotPlug+ Surprise+ Interlock- NoCompl+ IbPresDis- LLActRep+\n  pci_bus 0000:20: dev 00, created physical slot 12\n  pcieport 0000:00:07.0: pciehp: Slot(12): Card not present\n  ...\n  pcieport 0000:21:02.0: pciehp: pcie_disable_notification: SLOTCTRL d8 write cmd 0\n  Oops: general protection fault, probably for non-canonical address 0x6b6b6b6b6b6b6b6b: 0000 [#1] PREEMPT SMP NOPTI\n  CPU: 13 UID: 0 PID: 134 Comm: irq/156-pciehp Not tainted 6.11.0-devel+ #1\n  RIP: 0010:dev_driver_string+0x12/0x40\n  pci_destroy_slot\n  pciehp_remove\n  pcie_port_remove_service\n  device_release_driver_internal\n  bus_remove_device\n  device_del\n  device_unregister\n  remove_iter\n  device_for_each_child\n  pcie_portdrv_remove\n  pci_device_remove\n  device_release_driver_internal\n  bus_remove_device\n  device_del\n  pci_remove_bus_device (recursive invocation)\n  pci_remove_bus_device\n  pciehp_unconfigure_device\n  pciehp_disable_slot\n  pciehp_handle_presence_or_link_change\n  pciehp_ist",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1078"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-53194"
		},
		{
			"cve":"CVE-2024-53196",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nKVM: arm64: Don't retire aborted MMIO instruction\n\nReturning an abort to the guest for an unsupported MMIO access is a\ndocumented feature of the KVM UAPI. Nevertheless, it's clear that this\nplumbing has seen limited testing, since userspace can trivially cause a\nWARN in the MMIO return:\n\n  WARNING: CPU: 0 PID: 30558 at arch/arm64/include/asm/kvm_emulate.h:536 kvm_handle_mmio_return+0x46c/0x5c4 arch/arm64/include/asm/kvm_emulate.h:536\n  Call trace:\n   kvm_handle_mmio_return+0x46c/0x5c4 arch/arm64/include/asm/kvm_emulate.h:536\n   kvm_arch_vcpu_ioctl_run+0x98/0x15b4 arch/arm64/kvm/arm.c:1133\n   kvm_vcpu_ioctl+0x75c/0xa78 virt/kvm/kvm_main.c:4487\n   __do_sys_ioctl fs/ioctl.c:51 [inline]\n   __se_sys_ioctl fs/ioctl.c:893 [inline]\n   __arm64_sys_ioctl+0x14c/0x1c8 fs/ioctl.c:893\n   __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline]\n   invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:49\n   el0_svc_common+0x1e0/0x23c arch/arm64/kernel/syscall.c:132\n   do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:151\n   el0_svc+0x38/0x68 arch/arm64/kernel/entry-common.c:712\n   el0t_64_sync_handler+0x90/0xfc arch/arm64/kernel/entry-common.c:730\n   el0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:598\n\nThe splat is complaining that KVM is advancing PC while an exception is\npending, i.e. that KVM is retiring the MMIO instruction despite a\npending synchronous external abort. Womp womp.\n\nFix the glaring UAPI bug by skipping over all the MMIO emulation in\ncase there is a pending synchronous exception. Note that while userspace\nis capable of pending an asynchronous exception (SError, IRQ, or FIQ),\nit is still safe to retire the MMIO instruction in this case as (1) they\nare by definition asynchronous, and (2) KVM relies on hardware support\nfor pending/delivering these exceptions instead of the software state\nmachine for advancing PC.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1078"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-53196"
		},
		{
			"cve":"CVE-2024-53203",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nusb: typec: fix potential array underflow in ucsi_ccg_sync_control()\n\nThe \"command\" variable can be controlled by the user via debugfs.  The\nworry is that if con_index is zero then \"&uc->ucsi->connector[con_index\n- 1]\" would be an array underflow.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1078"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.8,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2024-53203"
		},
		{
			"cve":"CVE-2024-53213",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nnet: usb: lan78xx: Fix double free issue with interrupt buffer allocation\n\nIn lan78xx_probe(), the buffer `buf` was being freed twice: once\nimplicitly through `usb_free_urb(dev->urb_intr)` with the\n`URB_FREE_BUFFER` flag and again explicitly by `kfree(buf)`. This caused\na double free issue.\n\nTo resolve this, reordered `kmalloc()` and `usb_alloc_urb()` calls to\nsimplify the initialization sequence and removed the redundant\n`kfree(buf)`.  Now, `buf` is allocated after `usb_alloc_urb()`, ensuring\nit is correctly managed by  `usb_fill_int_urb()` and freed by\n`usb_free_urb()` as intended.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1078"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.8,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2024-53213"
		},
		{
			"cve":"CVE-2024-53215",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nsvcrdma: fix miss destroy percpu_counter in svc_rdma_proc_init()\n\nThere's issue as follows:\nRPC: Registered rdma transport module.\nRPC: Registered rdma backchannel transport module.\nRPC: Unregistered rdma transport module.\nRPC: Unregistered rdma backchannel transport module.\nBUG: unable to handle page fault for address: fffffbfff80c609a\nPGD 123fee067 P4D 123fee067 PUD 123fea067 PMD 10c624067 PTE 0\nOops: Oops: 0000 [#1] PREEMPT SMP KASAN NOPTI\nRIP: 0010:percpu_counter_destroy_many+0xf7/0x2a0\nCall Trace:\n <TASK>\n __die+0x1f/0x70\n page_fault_oops+0x2cd/0x860\n spurious_kernel_fault+0x36/0x450\n do_kern_addr_fault+0xca/0x100\n exc_page_fault+0x128/0x150\n asm_exc_page_fault+0x26/0x30\n percpu_counter_destroy_many+0xf7/0x2a0\n mmdrop+0x209/0x350\n finish_task_switch.isra.0+0x481/0x840\n schedule_tail+0xe/0xd0\n ret_from_fork+0x23/0x80\n ret_from_fork_asm+0x1a/0x30\n </TASK>\n\nIf register_sysctl() return NULL, then svc_rdma_proc_cleanup() will not\ndestroy the percpu counters which init in svc_rdma_proc_init().\nIf CONFIG_HOTPLUG_CPU is enabled, residual nodes may be in the\n'percpu_counters' list. The above issue may occur once the module is\nremoved. If the CONFIG_HOTPLUG_CPU configuration is not enabled, memory\nleakage occurs.\nTo solve above issue just destroy all percpu counters when\nregister_sysctl() return NULL.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1078"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-53215"
		},
		{
			"cve":"CVE-2024-53218",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nf2fs: fix race in concurrent f2fs_stop_gc_thread\n\nIn my test case, concurrent calls to f2fs shutdown report the following\nstack trace:\n\n Oops: general protection fault, probably for non-canonical address 0xc6cfff63bb5513fc: 0000 [#1] PREEMPT SMP PTI\n CPU: 0 UID: 0 PID: 678 Comm: f2fs_rep_shutdo Not tainted 6.12.0-rc5-next-20241029-g6fb2fa9805c5-dirty #85\n Call Trace:\n  <TASK>\n  ? show_regs+0x8b/0xa0\n  ? __die_body+0x26/0xa0\n  ? die_addr+0x54/0x90\n  ? exc_general_protection+0x24b/0x5c0\n  ? asm_exc_general_protection+0x26/0x30\n  ? kthread_stop+0x46/0x390\n  f2fs_stop_gc_thread+0x6c/0x110\n  f2fs_do_shutdown+0x309/0x3a0\n  f2fs_ioc_shutdown+0x150/0x1c0\n  __f2fs_ioctl+0xffd/0x2ac0\n  f2fs_ioctl+0x76/0xe0\n  vfs_ioctl+0x23/0x60\n  __x64_sys_ioctl+0xce/0xf0\n  x64_sys_call+0x2b1b/0x4540\n  do_syscall_64+0xa7/0x240\n  entry_SYSCALL_64_after_hwframe+0x76/0x7e\n\nThe root cause is a race condition in f2fs_stop_gc_thread() called from\ndifferent f2fs shutdown paths:\n\n  [CPU0]                       [CPU1]\n  ----------------------       -----------------------\n  f2fs_stop_gc_thread          f2fs_stop_gc_thread\n                                 gc_th = sbi->gc_thread\n    gc_th = sbi->gc_thread\n    kfree(gc_th)\n    sbi->gc_thread = NULL\n                                 < gc_th != NULL >\n                                 kthread_stop(gc_th->f2fs_gc_task) //UAF\n\nThe commit c7f114d864ac (\"f2fs: fix to avoid use-after-free in\nf2fs_stop_gc_thread()\") attempted to fix this issue by using a read\nsemaphore to prevent races between shutdown and remount threads, but\nit fails to prevent all race conditions.\n\nFix it by converting to write lock of s_umount in f2fs_do_shutdown().",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1078"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":4.7,
						"vectorString":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-53218"
		},
		{
			"cve":"CVE-2024-53219",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nvirtiofs: use pages instead of pointer for kernel direct IO\n\nWhen trying to insert a 10MB kernel module kept in a virtio-fs with cache\ndisabled, the following warning was reported:\n\n  ------------[ cut here ]------------\n  WARNING: CPU: 1 PID: 404 at mm/page_alloc.c:4551 ......\n  Modules linked in:\n  CPU: 1 PID: 404 Comm: insmod Not tainted 6.9.0-rc5+ #123\n  Hardware name: QEMU Standard PC (i440FX + PIIX, 1996) ......\n  RIP: 0010:__alloc_pages+0x2bf/0x380\n  ......\n  Call Trace:\n   <TASK>\n   ? __warn+0x8e/0x150\n   ? __alloc_pages+0x2bf/0x380\n   __kmalloc_large_node+0x86/0x160\n   __kmalloc+0x33c/0x480\n   virtio_fs_enqueue_req+0x240/0x6d0\n   virtio_fs_wake_pending_and_unlock+0x7f/0x190\n   queue_request_and_unlock+0x55/0x60\n   fuse_simple_request+0x152/0x2b0\n   fuse_direct_io+0x5d2/0x8c0\n   fuse_file_read_iter+0x121/0x160\n   __kernel_read+0x151/0x2d0\n   kernel_read+0x45/0x50\n   kernel_read_file+0x1a9/0x2a0\n   init_module_from_file+0x6a/0xe0\n   idempotent_init_module+0x175/0x230\n   __x64_sys_finit_module+0x5d/0xb0\n   x64_sys_call+0x1c3/0x9e0\n   do_syscall_64+0x3d/0xc0\n   entry_SYSCALL_64_after_hwframe+0x4b/0x53\n   ......\n   </TASK>\n  ---[ end trace 0000000000000000 ]---\n\nThe warning is triggered as follows:\n\n1) syscall finit_module() handles the module insertion and it invokes\nkernel_read_file() to read the content of the module first.\n\n2) kernel_read_file() allocates a 10MB buffer by using vmalloc() and\npasses it to kernel_read(). kernel_read() constructs a kvec iter by\nusing iov_iter_kvec() and passes it to fuse_file_read_iter().\n\n3) virtio-fs disables the cache, so fuse_file_read_iter() invokes\nfuse_direct_io(). As for now, the maximal read size for kvec iter is\nonly limited by fc->max_read. For virtio-fs, max_read is UINT_MAX, so\nfuse_direct_io() doesn't split the 10MB buffer. It saves the address and\nthe size of the 10MB-sized buffer in out_args[0] of a fuse request and\npasses the fuse request to virtio_fs_wake_pending_and_unlock().\n\n4) virtio_fs_wake_pending_and_unlock() uses virtio_fs_enqueue_req() to\nqueue the request. Because virtiofs need DMA-able address, so\nvirtio_fs_enqueue_req() uses kmalloc() to allocate a bounce buffer for\nall fuse args, copies these args into the bounce buffer and passed the\nphysical address of the bounce buffer to virtiofsd. The total length of\nthese fuse args for the passed fuse request is about 10MB, so\ncopy_args_to_argbuf() invokes kmalloc() with a 10MB size parameter and\nit triggers the warning in __alloc_pages():\n\n\tif (WARN_ON_ONCE_GFP(order > MAX_PAGE_ORDER, gfp))\n\t\treturn NULL;\n\n5) virtio_fs_enqueue_req() will retry the memory allocation in a\nkworker, but it won't help, because kmalloc() will always return NULL\ndue to the abnormal size and finit_module() will hang forever.\n\nA feasible solution is to limit the value of max_read for virtio-fs, so\nthe length passed to kmalloc() will be limited. However it will affect\nthe maximal read size for normal read. And for virtio-fs write initiated\nfrom kernel, it has the similar problem but now there is no way to limit\nfc->max_write in kernel.\n\nSo instead of limiting both the values of max_read and max_write in\nkernel, introducing use_pages_for_kvec_io in fuse_conn and setting it as\ntrue in virtiofs. When use_pages_for_kvec_io is enabled, fuse will use\npages instead of pointer to pass the KVEC_IO data.\n\nAfter switching to pages for KVEC_IO data, these pages will be used for\nDMA through virtio-fs. If these pages are backed by vmalloc(),\n{flush|invalidate}_kernel_vmap_range() are necessary to flush or\ninvalidate the cache before the DMA operation. So add two new fields in\nfuse_args_pages to record the base address of vmalloc area and the\ncondition indicating whether invalidation is needed. Perform the flush\nin fuse_get_user_pages() for write operations and the invalidation in\nfuse_release_user_pages() for read operations.\n\nIt may seem necessary to introduce another fie\n---truncated---",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1078"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":4.6,
						"vectorString":"CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-53219"
		},
		{
			"cve":"CVE-2024-53224",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/mlx5: Move events notifier registration to be after device registration\n\nMove pkey change work initialization and cleanup from device resources\nstage to notifier stage, since this is the stage which handles this work\nevents.\n\nFix a race between the device deregistration and pkey change work by moving\nMLX5_IB_STAGE_DEVICE_NOTIFIER to be after MLX5_IB_STAGE_IB_REG in order to\nensure that the notifier is deregistered before the device during cleanup.\nWhich ensures there are no works that are being executed after the\ndevice has already unregistered which can cause the panic below.\n\nBUG: kernel NULL pointer dereference, address: 0000000000000000\nPGD 0 P4D 0\nOops: 0000 [#1] PREEMPT SMP PTI\nCPU: 1 PID: 630071 Comm: kworker/1:2 Kdump: loaded Tainted: G W OE --------- --- 5.14.0-162.6.1.el9_1.x86_64 #1\nHardware name: Microsoft Corporation Virtual Machine/Virtual Machine, BIOS 090008 02/27/2023\nWorkqueue: events pkey_change_handler [mlx5_ib]\nRIP: 0010:setup_qp+0x38/0x1f0 [mlx5_ib]\nCode: ee 41 54 45 31 e4 55 89 f5 53 48 89 fb 48 83 ec 20 8b 77 08 65 48 8b 04 25 28 00 00 00 48 89 44 24 18 48 8b 07 48 8d 4c 24 16 <4c> 8b 38 49 8b 87 80 0b 00 00 4c 89 ff 48 8b 80 08 05 00 00 8b 40\nRSP: 0018:ffffbcc54068be20 EFLAGS: 00010282\nRAX: 0000000000000000 RBX: ffff954054494128 RCX: ffffbcc54068be36\nRDX: ffff954004934000 RSI: 0000000000000001 RDI: ffff954054494128\nRBP: 0000000000000023 R08: ffff954001be2c20 R09: 0000000000000001\nR10: ffff954001be2c20 R11: ffff9540260133c0 R12: 0000000000000000\nR13: 0000000000000023 R14: 0000000000000000 R15: ffff9540ffcb0905\nFS: 0000000000000000(0000) GS:ffff9540ffc80000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000000000000000 CR3: 000000010625c001 CR4: 00000000003706e0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nCall Trace:\nmlx5_ib_gsi_pkey_change+0x20/0x40 [mlx5_ib]\nprocess_one_work+0x1e8/0x3c0\nworker_thread+0x50/0x3b0\n? rescuer_thread+0x380/0x380\nkthread+0x149/0x170\n? set_kthread_struct+0x50/0x50\nret_from_fork+0x22/0x30\nModules linked in: rdma_ucm(OE) rdma_cm(OE) iw_cm(OE) ib_ipoib(OE) ib_cm(OE) ib_umad(OE) mlx5_ib(OE) mlx5_fwctl(OE) fwctl(OE) ib_uverbs(OE) mlx5_core(OE) mlxdevm(OE) ib_core(OE) mlx_compat(OE) psample mlxfw(OE) tls knem(OE) netconsole nfsv3 nfs_acl nfs lockd grace fscache netfs qrtr rfkill sunrpc intel_rapl_msr intel_rapl_common rapl hv_balloon hv_utils i2c_piix4 pcspkr joydev fuse ext4 mbcache jbd2 sr_mod sd_mod cdrom t10_pi sg ata_generic pci_hyperv pci_hyperv_intf hyperv_drm drm_shmem_helper drm_kms_helper hv_storvsc syscopyarea hv_netvsc sysfillrect sysimgblt hid_hyperv fb_sys_fops scsi_transport_fc hyperv_keyboard drm ata_piix crct10dif_pclmul crc32_pclmul crc32c_intel libata ghash_clmulni_intel hv_vmbus serio_raw [last unloaded: ib_core]\nCR2: 0000000000000000\n---[ end trace f6f8be4eae12f7bc ]---",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1078"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-53224"
		},
		{
			"cve":"CVE-2024-53226",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/hns: Fix NULL pointer derefernce in hns_roce_map_mr_sg()\n\nib_map_mr_sg() allows ULPs to specify NULL as the sg_offset argument.\nThe driver needs to check whether it is a NULL pointer before\ndereferencing it.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1078"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-53226"
		},
		{
			"cve":"CVE-2024-53229",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/rxe: Fix the qp flush warnings in req\n\nWhen the qp is in error state, the status of WQEs in the queue should be\nset to error. Or else the following will appear.\n\n[  920.617269] WARNING: CPU: 1 PID: 21 at drivers/infiniband/sw/rxe/rxe_comp.c:756 rxe_completer+0x989/0xcc0 [rdma_rxe]\n[  920.617744] Modules linked in: rnbd_client(O) rtrs_client(O) rtrs_core(O) rdma_ucm rdma_cm iw_cm ib_cm crc32_generic rdma_rxe ip6_udp_tunnel udp_tunnel ib_uverbs ib_core loop brd null_blk ipv6\n[  920.618516] CPU: 1 PID: 21 Comm: ksoftirqd/1 Tainted: G           O       6.1.113-storage+ #65\n[  920.618986] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 04/01/2014\n[  920.619396] RIP: 0010:rxe_completer+0x989/0xcc0 [rdma_rxe]\n[  920.619658] Code: 0f b6 84 24 3a 02 00 00 41 89 84 24 44 04 00 00 e9 2a f7 ff ff 39 ca bb 03 00 00 00 b8 0e 00 00 00 48 0f 45 d8 e9 15 f7 ff ff <0f> 0b e9 cb f8 ff ff 41 bf f5 ff ff ff e9 08 f8 ff ff 49 8d bc 24\n[  920.620482] RSP: 0018:ffff97b7c00bbc38 EFLAGS: 00010246\n[  920.620817] RAX: 0000000000000000 RBX: 000000000000000c RCX: 0000000000000008\n[  920.621183] RDX: ffff960dc396ebc0 RSI: 0000000000005400 RDI: ffff960dc4e2fbac\n[  920.621548] RBP: 0000000000000000 R08: 0000000000000001 R09: ffffffffac406450\n[  920.621884] R10: ffffffffac4060c0 R11: 0000000000000001 R12: ffff960dc4e2f800\n[  920.622254] R13: ffff960dc4e2f928 R14: ffff97b7c029c580 R15: 0000000000000000\n[  920.622609] FS:  0000000000000000(0000) GS:ffff960ef7d00000(0000) knlGS:0000000000000000\n[  920.622979] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[  920.623245] CR2: 00007fa056965e90 CR3: 00000001107f1000 CR4: 00000000000006e0\n[  920.623680] Call Trace:\n[  920.623815]  <TASK>\n[  920.623933]  ? __warn+0x79/0xc0\n[  920.624116]  ? rxe_completer+0x989/0xcc0 [rdma_rxe]\n[  920.624356]  ? report_bug+0xfb/0x150\n[  920.624594]  ? handle_bug+0x3c/0x60\n[  920.624796]  ? exc_invalid_op+0x14/0x70\n[  920.624976]  ? asm_exc_invalid_op+0x16/0x20\n[  920.625203]  ? rxe_completer+0x989/0xcc0 [rdma_rxe]\n[  920.625474]  ? rxe_completer+0x329/0xcc0 [rdma_rxe]\n[  920.625749]  rxe_do_task+0x80/0x110 [rdma_rxe]\n[  920.626037]  rxe_requester+0x625/0xde0 [rdma_rxe]\n[  920.626310]  ? rxe_cq_post+0xe2/0x180 [rdma_rxe]\n[  920.626583]  ? do_complete+0x18d/0x220 [rdma_rxe]\n[  920.626812]  ? rxe_completer+0x1a3/0xcc0 [rdma_rxe]\n[  920.627050]  rxe_do_task+0x80/0x110 [rdma_rxe]\n[  920.627285]  tasklet_action_common.constprop.0+0xa4/0x120\n[  920.627522]  handle_softirqs+0xc2/0x250\n[  920.627728]  ? sort_range+0x20/0x20\n[  920.627942]  run_ksoftirqd+0x1f/0x30\n[  920.628158]  smpboot_thread_fn+0xc7/0x1b0\n[  920.628334]  kthread+0xd6/0x100\n[  920.628504]  ? kthread_complete_and_exit+0x20/0x20\n[  920.628709]  ret_from_fork+0x1f/0x30\n[  920.628892]  </TASK>",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1078"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.0,
						"vectorString":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2024-53229"
		},
		{
			"cve":"CVE-2024-53231",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\ncpufreq: CPPC: Fix possible null-ptr-deref for cpufreq_cpu_get_raw()\n\ncpufreq_cpu_get_raw() may return NULL if the cpu is not in\npolicy->cpus cpu mask and it will cause null pointer dereference.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1078"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-53231"
		},
		{
			"cve":"CVE-2024-53234",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nerofs: handle NONHEAD !delta[1] lclusters gracefully\n\nsyzbot reported a WARNING in iomap_iter_done:\n iomap_fiemap+0x73b/0x9b0 fs/iomap/fiemap.c:80\n ioctl_fiemap fs/ioctl.c:220 [inline]\n\nGenerally, NONHEAD lclusters won't have delta[1]==0, except for crafted\nimages and filesystems created by pre-1.0 mkfs versions.\n\nPreviously, it would immediately bail out if delta[1]==0, which led to\ninadequate decompressed lengths (thus FIEMAP is impacted).  Treat it as\ndelta[1]=1 to work around these legacy mkfs versions.\n\n`lclusterbits > 14` is illegal for compact indexes, error out too.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1078"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-53234"
		},
		{
			"cve":"CVE-2024-53239",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: 6fire: Release resources at card release\n\nThe current 6fire code tries to release the resources right after the\ncall of usb6fire_chip_abort().  But at this moment, the card object\nmight be still in use (as we're calling snd_card_free_when_closed()).\n\nFor avoid potential UAFs, move the release of resources to the card's\nprivate_free instead of the manual call of usb6fire_chip_destroy() at\nthe USB disconnect callback.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1078"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-53239"
		},
		{
			"cve":"CVE-2024-53241",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nx86/xen: don't do PV iret hypercall through hypercall page\n\nInstead of jumping to the Xen hypercall page for doing the iret\nhypercall, directly code the required sequence in xen-asm.S.\n\nThis is done in preparation of no longer using hypercall page at all,\nas it has shown to cause problems with speculation mitigations.\n\nThis is part of XSA-466 / CVE-2024-53241.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1078"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.7,
						"vectorString":"CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-53241"
		},
		{
			"cve":"CVE-2024-55639",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nnet: renesas: rswitch: avoid use-after-put for a device tree node\n\nThe device tree node saved in the rswitch_device structure is used at\nseveral driver locations. So passing this node to of_node_put() after\nthe first use is wrong.\n\nMove of_node_put() for this node to exit paths.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1078"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.0,
						"vectorString":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2024-55639"
		},
		{
			"cve":"CVE-2024-56543",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: ath12k: Skip Rx TID cleanup for self peer\n\nDuring peer create, dp setup for the peer is done where Rx TID is\nupdated for all the TIDs. Peer object for self peer will not go through\ndp setup.\n\nWhen core halts, dp cleanup is done for all the peers. While cleanup,\nrx_tid::ab is accessed which causes below stack trace for self peer.\n\nWARNING: CPU: 6 PID: 12297 at drivers/net/wireless/ath/ath12k/dp_rx.c:851\nCall Trace:\n__warn+0x7b/0x1a0\nath12k_dp_rx_frags_cleanup+0xd2/0xe0 [ath12k]\nreport_bug+0x10b/0x200\nhandle_bug+0x3f/0x70\nexc_invalid_op+0x13/0x60\nasm_exc_invalid_op+0x16/0x20\nath12k_dp_rx_frags_cleanup+0xd2/0xe0 [ath12k]\nath12k_dp_rx_frags_cleanup+0xca/0xe0 [ath12k]\nath12k_dp_rx_peer_tid_cleanup+0x39/0xa0 [ath12k]\nath12k_mac_peer_cleanup_all+0x61/0x100 [ath12k]\nath12k_core_halt+0x3b/0x100 [ath12k]\nath12k_core_reset+0x494/0x4c0 [ath12k]\n\nsta object in peer will be updated when remote peer is created. Hence\nuse peer::sta to detect the self peer and skip the cleanup.\n\nTested-on: QCN9274 hw2.0 PCI WLAN.WBE.1.0.1-00029-QCAHKSWPL_SILICONZ-1\nTested-on: WCN7850 hw2.0 PCI WLAN.HMT.1.0.c5-00481-QCAHMTSWPL_V1.0_V2.0_SILICONZ-3",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1078"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"LOW",
						"baseScore":3.9,
						"vectorString":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Low",
					"category":"impact"
				}
			],
			"title":"CVE-2024-56543"
		},
		{
			"cve":"CVE-2024-56546",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\ndrivers: soc: xilinx: add the missing kfree in xlnx_add_cb_for_suspend()\n\nIf we fail to allocate memory for cb_data by kmalloc, the memory\nallocation for eve_data is never freed, add the missing kfree()\nin the error handling path.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1078"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"LOW",
						"baseScore":3.9,
						"vectorString":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Low",
					"category":"impact"
				}
			],
			"title":"CVE-2024-56546"
		},
		{
			"cve":"CVE-2024-56549",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\ncachefiles: Fix NULL pointer dereference in object->file\n\nAt present, the object->file has the NULL pointer dereference problem in\nondemand-mode. The root cause is that the allocated fd and object->file\nlifetime are inconsistent, and the user-space invocation to anon_fd uses\nobject->file. Following is the process that triggers the issue:\n\n\t  [write fd]\t\t\t\t[umount]\ncachefiles_ondemand_fd_write_iter\n\t\t\t\t       fscache_cookie_state_machine\n\t\t\t\t\t cachefiles_withdraw_cookie\n  if (!file) return -ENOBUFS\n\t\t\t\t\t   cachefiles_clean_up_object\n\t\t\t\t\t     cachefiles_unmark_inode_in_use\n\t\t\t\t\t     fput(object->file)\n\t\t\t\t\t     object->file = NULL\n  // file NULL pointer dereference!\n  __cachefiles_write(..., file, ...)\n\nFix this issue by add an additional reference count to the object->file\nbefore write/llseek, and decrement after it finished.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1078"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-56549"
		},
		{
			"cve":"CVE-2024-56562",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\ni3c: master: Fix miss free init_dyn_addr at i3c_master_put_i3c_addrs()\n\nif (dev->boardinfo && dev->boardinfo->init_dyn_addr)\n                                      ^^^ here check \"init_dyn_addr\"\n\ti3c_bus_set_addr_slot_status(&master->bus, dev->info.dyn_addr, ...)\n\t\t\t\t\t\t             ^^^^\n\t\t\t\t\t\t\tfree \"dyn_addr\"\nFix copy/paste error \"dyn_addr\" by replacing it with \"init_dyn_addr\".",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1078"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"LOW",
						"baseScore":3.9,
						"vectorString":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Low",
					"category":"impact"
				}
			],
			"title":"CVE-2024-56562"
		},
		{
			"cve":"CVE-2024-56570",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\novl: Filter invalid inodes with missing lookup function\n\nAdd a check to the ovl_dentry_weird() function to prevent the\nprocessing of directory inodes that lack the lookup function.\nThis is important because such inodes can cause errors in overlayfs\nwhen passed to the lowerstack.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1078"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":8.0,
						"vectorString":"CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2024-56570"
		},
		{
			"cve":"CVE-2024-56572",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: platform: allegro-dvt: Fix possible memory leak in allocate_buffers_internal()\n\nThe buffer in the loop should be released under the exception path,\notherwise there may be a memory leak here.\n\nTo mitigate this, free the buffer when allegro_alloc_buffer fails.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1078"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-56572"
		},
		{
			"cve":"CVE-2024-56582",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: fix use-after-free in btrfs_encoded_read_endio()\n\nShinichiro reported the following use-after free that sometimes is\nhappening in our CI system when running fstests' btrfs/284 on a TCMU\nrunner device:\n\n  BUG: KASAN: slab-use-after-free in lock_release+0x708/0x780\n  Read of size 8 at addr ffff888106a83f18 by task kworker/u80:6/219\n\n  CPU: 8 UID: 0 PID: 219 Comm: kworker/u80:6 Not tainted 6.12.0-rc6-kts+ #15\n  Hardware name: Supermicro Super Server/X11SPi-TF, BIOS 3.3 02/21/2020\n  Workqueue: btrfs-endio btrfs_end_bio_work [btrfs]\n  Call Trace:\n   <TASK>\n   dump_stack_lvl+0x6e/0xa0\n   ? lock_release+0x708/0x780\n   print_report+0x174/0x505\n   ? lock_release+0x708/0x780\n   ? __virt_addr_valid+0x224/0x410\n   ? lock_release+0x708/0x780\n   kasan_report+0xda/0x1b0\n   ? lock_release+0x708/0x780\n   ? __wake_up+0x44/0x60\n   lock_release+0x708/0x780\n   ? __pfx_lock_release+0x10/0x10\n   ? __pfx_do_raw_spin_lock+0x10/0x10\n   ? lock_is_held_type+0x9a/0x110\n   _raw_spin_unlock_irqrestore+0x1f/0x60\n   __wake_up+0x44/0x60\n   btrfs_encoded_read_endio+0x14b/0x190 [btrfs]\n   btrfs_check_read_bio+0x8d9/0x1360 [btrfs]\n   ? lock_release+0x1b0/0x780\n   ? trace_lock_acquire+0x12f/0x1a0\n   ? __pfx_btrfs_check_read_bio+0x10/0x10 [btrfs]\n   ? process_one_work+0x7e3/0x1460\n   ? lock_acquire+0x31/0xc0\n   ? process_one_work+0x7e3/0x1460\n   process_one_work+0x85c/0x1460\n   ? __pfx_process_one_work+0x10/0x10\n   ? assign_work+0x16c/0x240\n   worker_thread+0x5e6/0xfc0\n   ? __pfx_worker_thread+0x10/0x10\n   kthread+0x2c3/0x3a0\n   ? __pfx_kthread+0x10/0x10\n   ret_from_fork+0x31/0x70\n   ? __pfx_kthread+0x10/0x10\n   ret_from_fork_asm+0x1a/0x30\n   </TASK>\n\n  Allocated by task 3661:\n   kasan_save_stack+0x30/0x50\n   kasan_save_track+0x14/0x30\n   __kasan_kmalloc+0xaa/0xb0\n   btrfs_encoded_read_regular_fill_pages+0x16c/0x6d0 [btrfs]\n   send_extent_data+0xf0f/0x24a0 [btrfs]\n   process_extent+0x48a/0x1830 [btrfs]\n   changed_cb+0x178b/0x2ea0 [btrfs]\n   btrfs_ioctl_send+0x3bf9/0x5c20 [btrfs]\n   _btrfs_ioctl_send+0x117/0x330 [btrfs]\n   btrfs_ioctl+0x184a/0x60a0 [btrfs]\n   __x64_sys_ioctl+0x12e/0x1a0\n   do_syscall_64+0x95/0x180\n   entry_SYSCALL_64_after_hwframe+0x76/0x7e\n\n  Freed by task 3661:\n   kasan_save_stack+0x30/0x50\n   kasan_save_track+0x14/0x30\n   kasan_save_free_info+0x3b/0x70\n   __kasan_slab_free+0x4f/0x70\n   kfree+0x143/0x490\n   btrfs_encoded_read_regular_fill_pages+0x531/0x6d0 [btrfs]\n   send_extent_data+0xf0f/0x24a0 [btrfs]\n   process_extent+0x48a/0x1830 [btrfs]\n   changed_cb+0x178b/0x2ea0 [btrfs]\n   btrfs_ioctl_send+0x3bf9/0x5c20 [btrfs]\n   _btrfs_ioctl_send+0x117/0x330 [btrfs]\n   btrfs_ioctl+0x184a/0x60a0 [btrfs]\n   __x64_sys_ioctl+0x12e/0x1a0\n   do_syscall_64+0x95/0x180\n   entry_SYSCALL_64_after_hwframe+0x76/0x7e\n\n  The buggy address belongs to the object at ffff888106a83f00\n   which belongs to the cache kmalloc-rnd-07-96 of size 96\n  The buggy address is located 24 bytes inside of\n   freed 96-byte region [ffff888106a83f00, ffff888106a83f60)\n\n  The buggy address belongs to the physical page:\n  page: refcount:1 mapcount:0 mapping:0000000000000000 index:0xffff888106a83800 pfn:0x106a83\n  flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff)\n  page_type: f5(slab)\n  raw: 0017ffffc0000000 ffff888100053680 ffffea0004917200 0000000000000004\n  raw: ffff888106a83800 0000000080200019 00000001f5000000 0000000000000000\n  page dumped because: kasan: bad access detected\n\n  Memory state around the buggy address:\n   ffff888106a83e00: fa fb fb fb fb fb fb fb fb fb fb fb fc fc fc fc\n   ffff888106a83e80: fa fb fb fb fb fb fb fb fb fb fb fb fc fc fc fc\n  >ffff888106a83f00: fa fb fb fb fb fb fb fb fb fb fb fb fc fc fc fc\n                              ^\n   ffff888106a83f80: fa fb fb fb fb fb fb fb fb fb fb fb fc fc fc fc\n   ffff888106a84000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00\n  ==================================================================\n\nFurther analyzing the trace and \n---truncated---",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1078"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.8,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2024-56582"
		},
		{
			"cve":"CVE-2024-56583",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nsched/deadline: Fix warning in migrate_enable for boosted tasks\n\nWhen running the following command:\n\nwhile true; do\n    stress-ng --cyclic 30 --timeout 30s --minimize --quiet\ndone\n\na warning is eventually triggered:\n\nWARNING: CPU: 43 PID: 2848 at kernel/sched/deadline.c:794\nsetup_new_dl_entity+0x13e/0x180\n...\nCall Trace:\n <TASK>\n ? show_trace_log_lvl+0x1c4/0x2df\n ? enqueue_dl_entity+0x631/0x6e0\n ? setup_new_dl_entity+0x13e/0x180\n ? __warn+0x7e/0xd0\n ? report_bug+0x11a/0x1a0\n ? handle_bug+0x3c/0x70\n ? exc_invalid_op+0x14/0x70\n ? asm_exc_invalid_op+0x16/0x20\n enqueue_dl_entity+0x631/0x6e0\n enqueue_task_dl+0x7d/0x120\n __do_set_cpus_allowed+0xe3/0x280\n __set_cpus_allowed_ptr_locked+0x140/0x1d0\n __set_cpus_allowed_ptr+0x54/0xa0\n migrate_enable+0x7e/0x150\n rt_spin_unlock+0x1c/0x90\n group_send_sig_info+0xf7/0x1a0\n ? kill_pid_info+0x1f/0x1d0\n kill_pid_info+0x78/0x1d0\n kill_proc_info+0x5b/0x110\n __x64_sys_kill+0x93/0xc0\n do_syscall_64+0x5c/0xf0\n entry_SYSCALL_64_after_hwframe+0x6e/0x76\n RIP: 0033:0x7f0dab31f92b\n\nThis warning occurs because set_cpus_allowed dequeues and enqueues tasks\nwith the ENQUEUE_RESTORE flag set. If the task is boosted, the warning\nis triggered. A boosted task already had its parameters set by\nrt_mutex_setprio, and a new call to setup_new_dl_entity is unnecessary,\nhence the WARN_ON call.\n\nCheck if we are requeueing a boosted task and avoid calling\nsetup_new_dl_entity if that's the case.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1078"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-56583"
		},
		{
			"cve":"CVE-2024-56585",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nLoongArch: Fix sleeping in atomic context for PREEMPT_RT\n\nCommit bab1c299f3945ffe79 (\"LoongArch: Fix sleeping in atomic context in\nsetup_tlb_handler()\") changes the gfp flag from GFP_KERNEL to GFP_ATOMIC\nfor alloc_pages_node(). However, for PREEMPT_RT kernels we can still get\na \"sleeping in atomic context\" error:\n\n[    0.372259] BUG: sleeping function called from invalid context at kernel/locking/spinlock_rt.c:48\n[    0.372266] in_atomic(): 1, irqs_disabled(): 1, non_block: 0, pid: 0, name: swapper/1\n[    0.372268] preempt_count: 1, expected: 0\n[    0.372270] RCU nest depth: 1, expected: 1\n[    0.372272] 3 locks held by swapper/1/0:\n[    0.372274]  #0: 900000000c9f5e60 (&pcp->lock){+.+.}-{3:3}, at: get_page_from_freelist+0x524/0x1c60\n[    0.372294]  #1: 90000000087013b8 (rcu_read_lock){....}-{1:3}, at: rt_spin_trylock+0x50/0x140\n[    0.372305]  #2: 900000047fffd388 (&zone->lock){+.+.}-{3:3}, at: __rmqueue_pcplist+0x30c/0xea0\n[    0.372314] irq event stamp: 0\n[    0.372316] hardirqs last  enabled at (0): [<0000000000000000>] 0x0\n[    0.372322] hardirqs last disabled at (0): [<9000000005947320>] copy_process+0x9c0/0x26e0\n[    0.372329] softirqs last  enabled at (0): [<9000000005947320>] copy_process+0x9c0/0x26e0\n[    0.372335] softirqs last disabled at (0): [<0000000000000000>] 0x0\n[    0.372341] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Not tainted 6.12.0-rc7+ #1891\n[    0.372346] Hardware name: Loongson Loongson-3A5000-7A1000-1w-CRB/Loongson-LS3A5000-7A1000-1w-CRB, BIOS vUDK2018-LoongArch-V2.0.0-prebeta9 10/21/2022\n[    0.372349] Stack : 0000000000000089 9000000005a0db9c 90000000071519c8 9000000100388000\n[    0.372486]         900000010038b890 0000000000000000 900000010038b898 9000000007e53788\n[    0.372492]         900000000815bcc8 900000000815bcc0 900000010038b700 0000000000000001\n[    0.372498]         0000000000000001 4b031894b9d6b725 00000000055ec000 9000000100338fc0\n[    0.372503]         00000000000000c4 0000000000000001 000000000000002d 0000000000000003\n[    0.372509]         0000000000000030 0000000000000003 00000000055ec000 0000000000000003\n[    0.372515]         900000000806d000 9000000007e53788 00000000000000b0 0000000000000004\n[    0.372521]         0000000000000000 0000000000000000 900000000c9f5f10 0000000000000000\n[    0.372526]         90000000076f12d8 9000000007e53788 9000000005924778 0000000000000000\n[    0.372532]         00000000000000b0 0000000000000004 0000000000000000 0000000000070000\n[    0.372537]         ...\n[    0.372540] Call Trace:\n[    0.372542] [<9000000005924778>] show_stack+0x38/0x180\n[    0.372548] [<90000000071519c4>] dump_stack_lvl+0x94/0xe4\n[    0.372555] [<900000000599b880>] __might_resched+0x1a0/0x260\n[    0.372561] [<90000000071675cc>] rt_spin_lock+0x4c/0x140\n[    0.372565] [<9000000005cbb768>] __rmqueue_pcplist+0x308/0xea0\n[    0.372570] [<9000000005cbed84>] get_page_from_freelist+0x564/0x1c60\n[    0.372575] [<9000000005cc0d98>] __alloc_pages_noprof+0x218/0x1820\n[    0.372580] [<900000000593b36c>] tlb_init+0x1ac/0x298\n[    0.372585] [<9000000005924b74>] per_cpu_trap_init+0x114/0x140\n[    0.372589] [<9000000005921964>] cpu_probe+0x4e4/0xa60\n[    0.372592] [<9000000005934874>] start_secondary+0x34/0xc0\n[    0.372599] [<900000000715615c>] smpboot_entry+0x64/0x6c\n\nThis is because in PREEMPT_RT kernels normal spinlocks are replaced by\nrt spinlocks and rt_spin_lock() will cause sleeping. Fix it by disabling\nNUMA optimization completely for PREEMPT_RT kernels.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1078"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-56585"
		},
		{
			"cve":"CVE-2024-56586",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nf2fs: fix f2fs_bug_on when uninstalling filesystem call f2fs_evict_inode.\n\ncreating a large files during checkpoint disable until it runs out of\nspace and then delete it, then remount to enable checkpoint again, and\nthen unmount the filesystem triggers the f2fs_bug_on as below:\n\n------------[ cut here ]------------\nkernel BUG at fs/f2fs/inode.c:896!\nCPU: 2 UID: 0 PID: 1286 Comm: umount Not tainted 6.11.0-rc7-dirty #360\nOops: invalid opcode: 0000 [#1] PREEMPT SMP NOPTI\nRIP: 0010:f2fs_evict_inode+0x58c/0x610\nCall Trace:\n __die_body+0x15/0x60\n die+0x33/0x50\n do_trap+0x10a/0x120\n f2fs_evict_inode+0x58c/0x610\n do_error_trap+0x60/0x80\n f2fs_evict_inode+0x58c/0x610\n exc_invalid_op+0x53/0x60\n f2fs_evict_inode+0x58c/0x610\n asm_exc_invalid_op+0x16/0x20\n f2fs_evict_inode+0x58c/0x610\n evict+0x101/0x260\n dispose_list+0x30/0x50\n evict_inodes+0x140/0x190\n generic_shutdown_super+0x2f/0x150\n kill_block_super+0x11/0x40\n kill_f2fs_super+0x7d/0x140\n deactivate_locked_super+0x2a/0x70\n cleanup_mnt+0xb3/0x140\n task_work_run+0x61/0x90\n\nThe root cause is: creating large files during disable checkpoint\nperiod results in not enough free segments, so when writing back root\ninode will failed in f2fs_enable_checkpoint. When umount the file\nsystem after enabling checkpoint, the root inode is dirty in\nf2fs_evict_inode function, which triggers BUG_ON. The steps to\nreproduce are as follows:\n\ndd if=/dev/zero of=f2fs.img bs=1M count=55\nmount f2fs.img f2fs_dir -o checkpoint=disable:10%\ndd if=/dev/zero of=big bs=1M count=50\nsync\nrm big\nmount -o remount,checkpoint=enable f2fs_dir\numount f2fs_dir\n\nLet's redirty inode when there is not free segments during checkpoint\nis disable.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1078"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-56586"
		},
		{
			"cve":"CVE-2024-56592",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Call free_htab_elem() after htab_unlock_bucket()\n\nFor htab of maps, when the map is removed from the htab, it may hold the\nlast reference of the map. bpf_map_fd_put_ptr() will invoke\nbpf_map_free_id() to free the id of the removed map element. However,\nbpf_map_fd_put_ptr() is invoked while holding a bucket lock\n(raw_spin_lock_t), and bpf_map_free_id() attempts to acquire map_idr_lock\n(spinlock_t), triggering the following lockdep warning:\n\n  =============================\n  [ BUG: Invalid wait context ]\n  6.11.0-rc4+ #49 Not tainted\n  -----------------------------\n  test_maps/4881 is trying to lock:\n  ffffffff84884578 (map_idr_lock){+...}-{3:3}, at: bpf_map_free_id.part.0+0x21/0x70\n  other info that might help us debug this:\n  context-{5:5}\n  2 locks held by test_maps/4881:\n   #0: ffffffff846caf60 (rcu_read_lock){....}-{1:3}, at: bpf_fd_htab_map_update_elem+0xf9/0x270\n   #1: ffff888149ced148 (&htab->lockdep_key#2){....}-{2:2}, at: htab_map_update_elem+0x178/0xa80\n  stack backtrace:\n  CPU: 0 UID: 0 PID: 4881 Comm: test_maps Not tainted 6.11.0-rc4+ #49\n  Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), ...\n  Call Trace:\n   <TASK>\n   dump_stack_lvl+0x6e/0xb0\n   dump_stack+0x10/0x20\n   __lock_acquire+0x73e/0x36c0\n   lock_acquire+0x182/0x450\n   _raw_spin_lock_irqsave+0x43/0x70\n   bpf_map_free_id.part.0+0x21/0x70\n   bpf_map_put+0xcf/0x110\n   bpf_map_fd_put_ptr+0x9a/0xb0\n   free_htab_elem+0x69/0xe0\n   htab_map_update_elem+0x50f/0xa80\n   bpf_fd_htab_map_update_elem+0x131/0x270\n   htab_map_update_elem+0x50f/0xa80\n   bpf_fd_htab_map_update_elem+0x131/0x270\n   bpf_map_update_value+0x266/0x380\n   __sys_bpf+0x21bb/0x36b0\n   __x64_sys_bpf+0x45/0x60\n   x64_sys_call+0x1b2a/0x20d0\n   do_syscall_64+0x5d/0x100\n   entry_SYSCALL_64_after_hwframe+0x76/0x7e\n\nOne way to fix the lockdep warning is using raw_spinlock_t for\nmap_idr_lock as well. However, bpf_map_alloc_id() invokes\nidr_alloc_cyclic() after acquiring map_idr_lock, it will trigger a\nsimilar lockdep warning because the slab's lock (s->cpu_slab->lock) is\nstill a spinlock.\n\nInstead of changing map_idr_lock's type, fix the issue by invoking\nhtab_put_fd_value() after htab_unlock_bucket(). However, only deferring\nthe invocation of htab_put_fd_value() is not enough, because the old map\npointers in htab of maps can not be saved during batched deletion.\nTherefore, also defer the invocation of free_htab_elem(), so these\nto-be-freed elements could be linked together similar to lru map.\n\nThere are four callers for ->map_fd_put_ptr:\n\n(1) alloc_htab_elem() (through htab_put_fd_value())\nIt invokes ->map_fd_put_ptr() under a raw_spinlock_t. The invocation of\nhtab_put_fd_value() can not simply move after htab_unlock_bucket(),\nbecause the old element has already been stashed in htab->extra_elems.\nIt may be reused immediately after htab_unlock_bucket() and the\ninvocation of htab_put_fd_value() after htab_unlock_bucket() may release\nthe newly-added element incorrectly. Therefore, saving the map pointer\nof the old element for htab of maps before unlocking the bucket and\nreleasing the map_ptr after unlock. Beside the map pointer in the old\nelement, should do the same thing for the special fields in the old\nelement as well.\n\n(2) free_htab_elem() (through htab_put_fd_value())\nIts caller includes __htab_map_lookup_and_delete_elem(),\nhtab_map_delete_elem() and __htab_map_lookup_and_delete_batch().\n\nFor htab_map_delete_elem(), simply invoke free_htab_elem() after\nhtab_unlock_bucket(). For __htab_map_lookup_and_delete_batch(), just\nlike lru map, linking the to-be-freed element into node_to_free list\nand invoking free_htab_elem() for these element after unlock. It is safe\nto reuse batch_flink as the link for node_to_free, because these\nelements have been removed from the hash llist.\n\nBecause htab of maps doesn't support lookup_and_delete operation,\n__htab_map_lookup_and_delete_elem() doesn't have the problem, so kept\nit as\n---truncated---",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1078"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-56592"
		},
		{
			"cve":"CVE-2024-56594",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amdgpu: set the right AMDGPU sg segment limitation\n\nThe driver needs to set the correct max_segment_size;\notherwise debug_dma_map_sg() will complain about the\nover-mapping of the AMDGPU sg length as following:\n\nWARNING: CPU: 6 PID: 1964 at kernel/dma/debug.c:1178 debug_dma_map_sg+0x2dc/0x370\n[  364.049444] Modules linked in: veth amdgpu(OE) amdxcp drm_exec gpu_sched drm_buddy drm_ttm_helper ttm(OE) drm_suballoc_helper drm_display_helper drm_kms_helper i2c_algo_bit rpcsec_gss_krb5 auth_rpcgss nfsv4 nfs lockd grace netfs xt_conntrack xt_MASQUERADE nf_conntrack_netlink xfrm_user xfrm_algo iptable_nat xt_addrtype iptable_filter br_netfilter nvme_fabrics overlay nfnetlink_cttimeout nfnetlink openvswitch nsh nf_conncount nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 libcrc32c bridge stp llc amd_atl intel_rapl_msr intel_rapl_common sunrpc sch_fq_codel snd_hda_codec_realtek snd_hda_codec_generic snd_hda_scodec_component snd_hda_codec_hdmi snd_hda_intel snd_intel_dspcfg edac_mce_amd binfmt_misc snd_hda_codec snd_pci_acp6x snd_hda_core snd_acp_config snd_hwdep snd_soc_acpi kvm_amd snd_pcm kvm snd_seq_midi snd_seq_midi_event crct10dif_pclmul ghash_clmulni_intel sha512_ssse3 snd_rawmidi sha256_ssse3 sha1_ssse3 aesni_intel snd_seq nls_iso8859_1 crypto_simd snd_seq_device cryptd snd_timer rapl input_leds snd\n[  364.049532]  ipmi_devintf wmi_bmof ccp serio_raw k10temp sp5100_tco soundcore ipmi_msghandler cm32181 industrialio mac_hid msr parport_pc ppdev lp parport drm efi_pstore ip_tables x_tables pci_stub crc32_pclmul nvme ahci libahci i2c_piix4 r8169 nvme_core i2c_designware_pci realtek i2c_ccgx_ucsi video wmi hid_generic cdc_ether usbnet usbhid hid r8152 mii\n[  364.049576] CPU: 6 PID: 1964 Comm: rocminfo Tainted: G           OE      6.10.0-custom #492\n[  364.049579] Hardware name: AMD Majolica-RN/Majolica-RN, BIOS RMJ1009A 06/13/2021\n[  364.049582] RIP: 0010:debug_dma_map_sg+0x2dc/0x370\n[  364.049585] Code: 89 4d b8 e8 36 b1 86 00 8b 4d b8 48 8b 55 b0 44 8b 45 a8 4c 8b 4d a0 48 89 c6 48 c7 c7 00 4b 74 bc 4c 89 4d b8 e8 b4 73 f3 ff <0f> 0b 4c 8b 4d b8 8b 15 c8 2c b8 01 85 d2 0f 85 ee fd ff ff 8b 05\n[  364.049588] RSP: 0018:ffff9ca600b57ac0 EFLAGS: 00010286\n[  364.049590] RAX: 0000000000000000 RBX: ffff88b7c132b0c8 RCX: 0000000000000027\n[  364.049592] RDX: ffff88bb0f521688 RSI: 0000000000000001 RDI: ffff88bb0f521680\n[  364.049594] RBP: ffff9ca600b57b20 R08: 000000000000006f R09: ffff9ca600b57930\n[  364.049596] R10: ffff9ca600b57928 R11: ffffffffbcb46328 R12: 0000000000000000\n[  364.049597] R13: 0000000000000001 R14: ffff88b7c19c0700 R15: ffff88b7c9059800\n[  364.049599] FS:  00007fb2d3516e80(0000) GS:ffff88bb0f500000(0000) knlGS:0000000000000000\n[  364.049601] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[  364.049603] CR2: 000055610bd03598 CR3: 00000001049f6000 CR4: 0000000000350ef0\n[  364.049605] Call Trace:\n[  364.049607]  <TASK>\n[  364.049609]  ? show_regs+0x6d/0x80\n[  364.049614]  ? __warn+0x8c/0x140\n[  364.049618]  ? debug_dma_map_sg+0x2dc/0x370\n[  364.049621]  ? report_bug+0x193/0x1a0\n[  364.049627]  ? handle_bug+0x46/0x80\n[  364.049631]  ? exc_invalid_op+0x1d/0x80\n[  364.049635]  ? asm_exc_invalid_op+0x1f/0x30\n[  364.049642]  ? debug_dma_map_sg+0x2dc/0x370\n[  364.049647]  __dma_map_sg_attrs+0x90/0xe0\n[  364.049651]  dma_map_sgtable+0x25/0x40\n[  364.049654]  amdgpu_bo_move+0x59a/0x850 [amdgpu]\n[  364.049935]  ? srso_return_thunk+0x5/0x5f\n[  364.049939]  ? amdgpu_ttm_tt_populate+0x5d/0xc0 [amdgpu]\n[  364.050095]  ttm_bo_handle_move_mem+0xc3/0x180 [ttm]\n[  364.050103]  ttm_bo_validate+0xc1/0x160 [ttm]\n[  364.050108]  ? amdgpu_ttm_tt_get_user_pages+0xe5/0x1b0 [amdgpu]\n[  364.050263]  amdgpu_amdkfd_gpuvm_alloc_memory_of_gpu+0xa12/0xc90 [amdgpu]\n[  364.050473]  kfd_ioctl_alloc_memory_of_gpu+0x16b/0x3b0 [amdgpu]\n[  364.050680]  kfd_ioctl+0x3c2/0x530 [amdgpu]\n[  364.050866]  ? __pfx_kfd_ioctl_alloc_memory_of_gpu+0x10/0x10 [amdgpu]\n[  364.05105\n---truncated---",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1078"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-56594"
		},
		{
			"cve":"CVE-2024-56595",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\njfs: add a check to prevent array-index-out-of-bounds in dbAdjTree\n\nWhen the value of lp is 0 at the beginning of the for loop, it will\nbecome negative in the next assignment and we should bail out.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1078"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.8,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2024-56595"
		},
		{
			"cve":"CVE-2024-56596",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\njfs: fix array-index-out-of-bounds in jfs_readdir\n\nThe stbl might contain some invalid values. Added a check to\nreturn error code in that case.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1078"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.8,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2024-56596"
		},
		{
			"cve":"CVE-2024-56597",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\njfs: fix shift-out-of-bounds in dbSplit\n\nWhen dmt_budmin is less than zero, it causes errors\nin the later stages. Added a check to return an error beforehand\nin dbAllocCtl itself.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1078"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"LOW",
						"baseScore":3.9,
						"vectorString":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Low",
					"category":"impact"
				}
			],
			"title":"CVE-2024-56597"
		},
		{
			"cve":"CVE-2024-56605",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: L2CAP: do not leave dangling sk pointer on error in l2cap_sock_create()\n\nbt_sock_alloc() allocates the sk object and attaches it to the provided\nsock object. On error l2cap_sock_alloc() frees the sk object, but the\ndangling pointer is still attached to the sock object, which may create\nuse-after-free in other code.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1078"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.8,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2024-56605"
		},
		{
			"cve":"CVE-2024-56609",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: rtw88: use ieee80211_purge_tx_queue() to purge TX skb\n\nWhen removing kernel modules by:\n   rmmod rtw88_8723cs rtw88_8703b rtw88_8723x rtw88_sdio rtw88_core\n\nDriver uses skb_queue_purge() to purge TX skb, but not report tx status\ncausing \"Have pending ack frames!\" warning. Use ieee80211_purge_tx_queue()\nto correct this.\n\nSince ieee80211_purge_tx_queue() doesn't take locks, to prevent racing\nbetween TX work and purge TX queue, flush and destroy TX work in advance.\n\n   wlan0: deauthenticating from aa:f5:fd:60:4c:a8 by local\n     choice (Reason: 3=DEAUTH_LEAVING)\n   ------------[ cut here ]------------\n   Have pending ack frames!\n   WARNING: CPU: 3 PID: 9232 at net/mac80211/main.c:1691\n       ieee80211_free_ack_frame+0x5c/0x90 [mac80211]\n   CPU: 3 PID: 9232 Comm: rmmod Tainted: G         C\n       6.10.1-200.fc40.aarch64 #1\n   Hardware name: pine64 Pine64 PinePhone Braveheart\n      (1.1)/Pine64 PinePhone Braveheart (1.1), BIOS 2024.01 01/01/2024\n   pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n   pc : ieee80211_free_ack_frame+0x5c/0x90 [mac80211]\n   lr : ieee80211_free_ack_frame+0x5c/0x90 [mac80211]\n   sp : ffff80008c1b37b0\n   x29: ffff80008c1b37b0 x28: ffff000003be8000 x27: 0000000000000000\n   x26: 0000000000000000 x25: ffff000003dc14b8 x24: ffff80008c1b37d0\n   x23: ffff000000ff9f80 x22: 0000000000000000 x21: 000000007fffffff\n   x20: ffff80007c7e93d8 x19: ffff00006e66f400 x18: 0000000000000000\n   x17: ffff7ffffd2b3000 x16: ffff800083fc0000 x15: 0000000000000000\n   x14: 0000000000000000 x13: 2173656d61726620 x12: 6b636120676e6964\n   x11: 0000000000000000 x10: 000000000000005d x9 : ffff8000802af2b0\n   x8 : ffff80008c1b3430 x7 : 0000000000000001 x6 : 0000000000000001\n   x5 : 0000000000000000 x4 : 0000000000000000 x3 : 0000000000000000\n   x2 : 0000000000000000 x1 : 0000000000000000 x0 : ffff000003be8000\n   Call trace:\n    ieee80211_free_ack_frame+0x5c/0x90 [mac80211]\n    idr_for_each+0x74/0x110\n    ieee80211_free_hw+0x44/0xe8 [mac80211]\n    rtw_sdio_remove+0x9c/0xc0 [rtw88_sdio]\n    sdio_bus_remove+0x44/0x180\n    device_remove+0x54/0x90\n    device_release_driver_internal+0x1d4/0x238\n    driver_detach+0x54/0xc0\n    bus_remove_driver+0x78/0x108\n    driver_unregister+0x38/0x78\n    sdio_unregister_driver+0x2c/0x40\n    rtw_8723cs_driver_exit+0x18/0x1000 [rtw88_8723cs]\n    __do_sys_delete_module.isra.0+0x190/0x338\n    __arm64_sys_delete_module+0x1c/0x30\n    invoke_syscall+0x74/0x100\n    el0_svc_common.constprop.0+0x48/0xf0\n    do_el0_svc+0x24/0x38\n    el0_svc+0x3c/0x158\n    el0t_64_sync_handler+0x120/0x138\n    el0t_64_sync+0x194/0x198\n   ---[ end trace 0000000000000000 ]---",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1078"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"LOW",
						"baseScore":3.9,
						"vectorString":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Low",
					"category":"impact"
				}
			],
			"title":"CVE-2024-56609"
		},
		{
			"cve":"CVE-2024-56613",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nsched/numa: fix memory leak due to the overwritten vma->numab_state\n\n[Problem Description]\nWhen running the hackbench program of LTP, the following memory leak is\nreported by kmemleak.\n\n  # /opt/ltp/testcases/bin/hackbench 20 thread 1000\n  Running with 20*40 (== 800) tasks.\n\n  # dmesg | grep kmemleak\n  ...\n  kmemleak: 480 new suspected memory leaks (see /sys/kernel/debug/kmemleak)\n  kmemleak: 665 new suspected memory leaks (see /sys/kernel/debug/kmemleak)\n\n  # cat /sys/kernel/debug/kmemleak\n  unreferenced object 0xffff888cd8ca2c40 (size 64):\n    comm \"hackbench\", pid 17142, jiffies 4299780315\n    hex dump (first 32 bytes):\n      ac 74 49 00 01 00 00 00 4c 84 49 00 01 00 00 00  .tI.....L.I.....\n      00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................\n    backtrace (crc bff18fd4):\n      [<ffffffff81419a89>] __kmalloc_cache_noprof+0x2f9/0x3f0\n      [<ffffffff8113f715>] task_numa_work+0x725/0xa00\n      [<ffffffff8110f878>] task_work_run+0x58/0x90\n      [<ffffffff81ddd9f8>] syscall_exit_to_user_mode+0x1c8/0x1e0\n      [<ffffffff81dd78d5>] do_syscall_64+0x85/0x150\n      [<ffffffff81e0012b>] entry_SYSCALL_64_after_hwframe+0x76/0x7e\n  ...\n\nThis issue can be consistently reproduced on three different servers:\n  * a 448-core server\n  * a 256-core server\n  * a 192-core server\n\n[Root Cause]\nSince multiple threads are created by the hackbench program (along with\nthe command argument 'thread'), a shared vma might be accessed by two or\nmore cores simultaneously. When two or more cores observe that\nvma->numab_state is NULL at the same time, vma->numab_state will be\noverwritten.\n\nAlthough current code ensures that only one thread scans the VMAs in a\nsingle 'numa_scan_period', there might be a chance for another thread\nto enter in the next 'numa_scan_period' while we have not gotten till\nnumab_state allocation [1].\n\nNote that the command `/opt/ltp/testcases/bin/hackbench 50 process 1000`\ncannot the reproduce the issue. It is verified with 200+ test runs.\n\n[Solution]\nUse the cmpxchg atomic operation to ensure that only one thread executes\nthe vma->numab_state assignment.\n\n[1] https://lore.kernel.org/lkml/1794be3c-358c-4cdc-a43d-a1f841d91ef7@amd.com/",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1078"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-56613"
		},
		{
			"cve":"CVE-2024-56619",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nnilfs2: fix potential out-of-bounds memory access in nilfs_find_entry()\n\nSyzbot reported that when searching for records in a directory where the\ninode's i_size is corrupted and has a large value, memory access outside\nthe folio/page range may occur, or a use-after-free bug may be detected if\nKASAN is enabled.\n\nThis is because nilfs_last_byte(), which is called by nilfs_find_entry()\nand others to calculate the number of valid bytes of directory data in a\npage from i_size and the page index, loses the upper 32 bits of the 64-bit\nsize information due to an inappropriate type of local variable to which\nthe i_size value is assigned.\n\nThis caused a large byte offset value due to underflow in the end address\ncalculation in the calling nilfs_find_entry(), resulting in memory access\nthat exceeds the folio/page size.\n\nFix this issue by changing the type of the local variable causing the bit\nloss from \"unsigned int\" to \"u64\".  The return value of nilfs_last_byte()\nis also of type \"unsigned int\", but it is truncated so as not to exceed\nPAGE_SIZE and no bit loss occurs, so no change is required.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1078"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":8.0,
						"vectorString":"CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2024-56619"
		},
		{
			"cve":"CVE-2024-56622",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: ufs: core: sysfs: Prevent div by zero\n\nPrevent a division by 0 when monitoring is not enabled.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1078"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-56622"
		},
		{
			"cve":"CVE-2024-56626",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nksmbd: fix Out-of-Bounds Write in ksmbd_vfs_stream_write\n\nAn offset from client could be a negative value, It could allows\nto write data outside the bounds of the allocated buffer.\nNote that this issue is coming when setting\n'vfs objects = streams_xattr parameter' in ksmbd.conf..",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1078"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.8,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2024-56626"
		},
		{
			"cve":"CVE-2024-56631",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: sg: Fix slab-use-after-free read in sg_release()\n\nFix a use-after-free bug in sg_release(), detected by syzbot with KASAN:\n\nBUG: KASAN: slab-use-after-free in lock_release+0x151/0xa30\nkernel/locking/lockdep.c:5838\n__mutex_unlock_slowpath+0xe2/0x750 kernel/locking/mutex.c:912\nsg_release+0x1f4/0x2e0 drivers/scsi/sg.c:407\n\nIn sg_release(), the function kref_put(&sfp->f_ref, sg_remove_sfp) is\ncalled before releasing the open_rel_lock mutex. The kref_put() call may\ndecrement the reference count of sfp to zero, triggering its cleanup\nthrough sg_remove_sfp(). This cleanup includes scheduling deferred work\nvia sg_remove_sfp_usercontext(), which ultimately frees sfp.\n\nAfter kref_put(), sg_release() continues to unlock open_rel_lock and may\nreference sfp or sdp. If sfp has already been freed, this results in a\nslab-use-after-free error.\n\nMove the kref_put(&sfp->f_ref, sg_remove_sfp) call after unlocking the\nopen_rel_lock mutex. This ensures:\n\n - No references to sfp or sdp occur after the reference count is\n   decremented.\n\n - Cleanup functions such as sg_remove_sfp() and\n   sg_remove_sfp_usercontext() can safely execute without impacting the\n   mutex handling in sg_release().\n\nThe fix has been tested and validated by syzbot. This patch closes the\nbug reported at the following syzkaller link and ensures proper\nsequencing of resource cleanup and mutex operations, eliminating the\nrisk of use-after-free errors in sg_release().",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1078"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.8,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2024-56631"
		},
		{
			"cve":"CVE-2024-56633",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\ntcp_bpf: Fix the sk_mem_uncharge logic in tcp_bpf_sendmsg\n\nThe current sk memory accounting logic in __SK_REDIRECT is pre-uncharging\ntosend bytes, which is either msg->sg.size or a smaller value apply_bytes.\n\nPotential problems with this strategy are as follows:\n\n- If the actual sent bytes are smaller than tosend, we need to charge some\n  bytes back, as in line 487, which is okay but seems not clean.\n\n- When tosend is set to apply_bytes, as in line 417, and (ret < 0), we may\n  miss uncharging (msg->sg.size - apply_bytes) bytes.\n\n[...]\n415 tosend = msg->sg.size;\n416 if (psock->apply_bytes && psock->apply_bytes < tosend)\n417   tosend = psock->apply_bytes;\n[...]\n443 sk_msg_return(sk, msg, tosend);\n444 release_sock(sk);\n446 origsize = msg->sg.size;\n447 ret = tcp_bpf_sendmsg_redir(sk_redir, redir_ingress,\n448                             msg, tosend, flags);\n449 sent = origsize - msg->sg.size;\n[...]\n454 lock_sock(sk);\n455 if (unlikely(ret < 0)) {\n456   int free = sk_msg_free_nocharge(sk, msg);\n458   if (!cork)\n459     *copied -= free;\n460 }\n[...]\n487 if (eval == __SK_REDIRECT)\n488   sk_mem_charge(sk, tosend - sent);\n[...]\n\nWhen running the selftest test_txmsg_redir_wait_sndmem with txmsg_apply,\nthe following warning will be reported:\n\n------------[ cut here ]------------\nWARNING: CPU: 6 PID: 57 at net/ipv4/af_inet.c:156 inet_sock_destruct+0x190/0x1a0\nModules linked in:\nCPU: 6 UID: 0 PID: 57 Comm: kworker/6:0 Not tainted 6.12.0-rc1.bm.1-amd64+ #43\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014\nWorkqueue: events sk_psock_destroy\nRIP: 0010:inet_sock_destruct+0x190/0x1a0\nRSP: 0018:ffffad0a8021fe08 EFLAGS: 00010206\nRAX: 0000000000000011 RBX: ffff9aab4475b900 RCX: ffff9aab481a0800\nRDX: 0000000000000303 RSI: 0000000000000011 RDI: ffff9aab4475b900\nRBP: ffff9aab4475b990 R08: 0000000000000000 R09: ffff9aab40050ec0\nR10: 0000000000000000 R11: ffff9aae6fdb1d01 R12: ffff9aab49c60400\nR13: ffff9aab49c60598 R14: ffff9aab49c60598 R15: dead000000000100\nFS:  0000000000000000(0000) GS:ffff9aae6fd80000(0000) knlGS:0000000000000000\nCS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00007ffec7e47bd8 CR3: 00000001a1a1c004 CR4: 0000000000770ef0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nPKRU: 55555554\nCall Trace:\n<TASK>\n? __warn+0x89/0x130\n? inet_sock_destruct+0x190/0x1a0\n? report_bug+0xfc/0x1e0\n? handle_bug+0x5c/0xa0\n? exc_invalid_op+0x17/0x70\n? asm_exc_invalid_op+0x1a/0x20\n? inet_sock_destruct+0x190/0x1a0\n__sk_destruct+0x25/0x220\nsk_psock_destroy+0x2b2/0x310\nprocess_scheduled_works+0xa3/0x3e0\nworker_thread+0x117/0x240\n? __pfx_worker_thread+0x10/0x10\nkthread+0xcf/0x100\n? __pfx_kthread+0x10/0x10\nret_from_fork+0x31/0x40\n? __pfx_kthread+0x10/0x10\nret_from_fork_asm+0x1a/0x30\n</TASK>\n---[ end trace 0000000000000000 ]---\n\nIn __SK_REDIRECT, a more concise way is delaying the uncharging after sent\nbytes are finalized, and uncharge this value. When (ret < 0), we shall\ninvoke sk_msg_free.\n\nSame thing happens in case __SK_DROP, when tosend is set to apply_bytes,\nwe may miss uncharging (msg->sg.size - apply_bytes) bytes. The same\nwarning will be reported in selftest.\n\n[...]\n468 case __SK_DROP:\n469 default:\n470 sk_msg_free_partial(sk, msg, tosend);\n471 sk_msg_apply_bytes(psock, tosend);\n472 *copied -= (tosend + delta);\n473 return -EACCES;\n[...]\n\nSo instead of sk_msg_free_partial we can do sk_msg_free here.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1078"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-56633"
		},
		{
			"cve":"CVE-2024-56638",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nft_inner: incorrect percpu area handling under softirq\n\nSoftirq can interrupt ongoing packet from process context that is\nwalking over the percpu area that contains inner header offsets.\n\nDisable bh and perform three checks before restoring the percpu inner\nheader offsets to validate that the percpu area is valid for this\nskbuff:\n\n1) If the NFT_PKTINFO_INNER_FULL flag is set on, then this skbuff\n   has already been parsed before for inner header fetching to\n   register.\n\n2) Validate that the percpu area refers to this skbuff using the\n   skbuff pointer as a cookie. If there is a cookie mismatch, then\n   this skbuff needs to be parsed again.\n\n3) Finally, validate if the percpu area refers to this tunnel type.\n\nOnly after these three checks the percpu area is restored to a on-stack\ncopy and bh is enabled again.\n\nAfter inner header fetching, the on-stack copy is stored back to the\npercpu area.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1078"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-56638"
		},
		{
			"cve":"CVE-2024-56649",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nnet: enetc: Do not configure preemptible TCs if SIs do not support\n\nBoth ENETC PF and VF drivers share enetc_setup_tc_mqprio() to configure\nMQPRIO. And enetc_setup_tc_mqprio() calls enetc_change_preemptible_tcs()\nto configure preemptible TCs. However, only PF is able to configure\npreemptible TCs. Because only PF has related registers, while VF does not\nhave these registers. So for VF, its hw->port pointer is NULL. Therefore,\nVF will access an invalid pointer when accessing a non-existent register,\nwhich will cause a crash issue. The simplified log is as follows.\n\nroot@ls1028ardb:~# tc qdisc add dev eno0vf0 parent root handle 100: \\\nmqprio num_tc 4 map 0 0 1 1 2 2 3 3 queues 1@0 1@1 1@2 1@3 hw 1\n[  187.290775] Unable to handle kernel paging request at virtual address 0000000000001f00\n[  187.424831] pc : enetc_mm_commit_preemptible_tcs+0x1c4/0x400\n[  187.430518] lr : enetc_mm_commit_preemptible_tcs+0x30c/0x400\n[  187.511140] Call trace:\n[  187.513588]  enetc_mm_commit_preemptible_tcs+0x1c4/0x400\n[  187.518918]  enetc_setup_tc_mqprio+0x180/0x214\n[  187.523374]  enetc_vf_setup_tc+0x1c/0x30\n[  187.527306]  mqprio_enable_offload+0x144/0x178\n[  187.531766]  mqprio_init+0x3ec/0x668\n[  187.535351]  qdisc_create+0x15c/0x488\n[  187.539023]  tc_modify_qdisc+0x398/0x73c\n[  187.542958]  rtnetlink_rcv_msg+0x128/0x378\n[  187.547064]  netlink_rcv_skb+0x60/0x130\n[  187.550910]  rtnetlink_rcv+0x18/0x24\n[  187.554492]  netlink_unicast+0x300/0x36c\n[  187.558425]  netlink_sendmsg+0x1a8/0x420\n[  187.606759] ---[ end trace 0000000000000000 ]---\n\nIn addition, some PFs also do not support configuring preemptible TCs,\nsuch as eno1 and eno3 on LS1028A. It won't crash like it does for VFs,\nbut we should prevent these PFs from accessing these unimplemented\nregisters.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1078"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-56649"
		},
		{
			"cve":"CVE-2024-56654",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: hci_event: Fix using rcu_read_(un)lock while iterating\n\nThe usage of rcu_read_(un)lock while inside list_for_each_entry_rcu is\nnot safe since for the most part entries fetched this way shall be\ntreated as rcu_dereference:\n\n\tNote that the value returned by rcu_dereference() is valid\n\tonly within the enclosing RCU read-side critical section [1]_.\n\tFor example, the following is **not** legal::\n\n\t\trcu_read_lock();\n\t\tp = rcu_dereference(head.next);\n\t\trcu_read_unlock();\n\t\tx = p->address;\t/* BUG!!! */\n\t\trcu_read_lock();\n\t\ty = p->data;\t/* BUG!!! */\n\t\trcu_read_unlock();",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1078"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-56654"
		},
		{
			"cve":"CVE-2024-56660",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx5: DR, prevent potential error pointer dereference\n\nThe dr_domain_add_vport_cap() function generally returns NULL on error\nbut sometimes we want it to return ERR_PTR(-EBUSY) so the caller can\nretry.  The problem here is that \"ret\" can be either -EBUSY or -ENOMEM\nand if it's and -ENOMEM then the error pointer is propogated back and\neventually dereferenced in dr_ste_v0_build_src_gvmi_qpn_tag().",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1078"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-56660"
		},
		{
			"cve":"CVE-2024-56662",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nacpi: nfit: vmalloc-out-of-bounds Read in acpi_nfit_ctl\n\nFix an issue detected by syzbot with KASAN:\n\nBUG: KASAN: vmalloc-out-of-bounds in cmd_to_func drivers/acpi/nfit/\ncore.c:416 [inline]\nBUG: KASAN: vmalloc-out-of-bounds in acpi_nfit_ctl+0x20e8/0x24a0\ndrivers/acpi/nfit/core.c:459\n\nThe issue occurs in cmd_to_func when the call_pkg->nd_reserved2\narray is accessed without verifying that call_pkg points to a buffer\nthat is appropriately sized as a struct nd_cmd_pkg. This can lead\nto out-of-bounds access and undefined behavior if the buffer does not\nhave sufficient space.\n\nTo address this, a check was added in acpi_nfit_ctl() to ensure that\nbuf is not NULL and that buf_len is less than sizeof(*call_pkg)\nbefore accessing it. This ensures safe access to the members of\ncall_pkg, including the nd_reserved2 array.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1078"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.1,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2024-56662"
		},
		{
			"cve":"CVE-2024-56663",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: nl80211: fix NL80211_ATTR_MLO_LINK_ID off-by-one\n\nSince the netlink attribute range validation provides inclusive\nchecking, the *max* of attribute NL80211_ATTR_MLO_LINK_ID should be\nIEEE80211_MLD_MAX_NUM_LINKS - 1 otherwise causing an off-by-one.\n\nOne crash stack for demonstration:\n==================================================================\nBUG: KASAN: wild-memory-access in ieee80211_tx_control_port+0x3b6/0xca0 net/mac80211/tx.c:5939\nRead of size 6 at addr 001102080000000c by task fuzzer.386/9508\n\nCPU: 1 PID: 9508 Comm: syz.1.386 Not tainted 6.1.70 #2\nCall Trace:\n <TASK>\n __dump_stack lib/dump_stack.c:88 [inline]\n dump_stack_lvl+0x177/0x231 lib/dump_stack.c:106\n print_report+0xe0/0x750 mm/kasan/report.c:398\n kasan_report+0x139/0x170 mm/kasan/report.c:495\n kasan_check_range+0x287/0x290 mm/kasan/generic.c:189\n memcpy+0x25/0x60 mm/kasan/shadow.c:65\n ieee80211_tx_control_port+0x3b6/0xca0 net/mac80211/tx.c:5939\n rdev_tx_control_port net/wireless/rdev-ops.h:761 [inline]\n nl80211_tx_control_port+0x7b3/0xc40 net/wireless/nl80211.c:15453\n genl_family_rcv_msg_doit+0x22e/0x320 net/netlink/genetlink.c:756\n genl_family_rcv_msg net/netlink/genetlink.c:833 [inline]\n genl_rcv_msg+0x539/0x740 net/netlink/genetlink.c:850\n netlink_rcv_skb+0x1de/0x420 net/netlink/af_netlink.c:2508\n genl_rcv+0x24/0x40 net/netlink/genetlink.c:861\n netlink_unicast_kernel net/netlink/af_netlink.c:1326 [inline]\n netlink_unicast+0x74b/0x8c0 net/netlink/af_netlink.c:1352\n netlink_sendmsg+0x882/0xb90 net/netlink/af_netlink.c:1874\n sock_sendmsg_nosec net/socket.c:716 [inline]\n __sock_sendmsg net/socket.c:728 [inline]\n ____sys_sendmsg+0x5cc/0x8f0 net/socket.c:2499\n ___sys_sendmsg+0x21c/0x290 net/socket.c:2553\n __sys_sendmsg net/socket.c:2582 [inline]\n __do_sys_sendmsg net/socket.c:2591 [inline]\n __se_sys_sendmsg+0x19e/0x270 net/socket.c:2589\n do_syscall_x64 arch/x86/entry/common.c:51 [inline]\n do_syscall_64+0x45/0x90 arch/x86/entry/common.c:81\n entry_SYSCALL_64_after_hwframe+0x63/0xcd\n\nUpdate the policy to ensure correct validation.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1078"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.1,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2024-56663"
		},
		{
			"cve":"CVE-2024-56667",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/i915: Fix NULL pointer dereference in capture_engine\n\nWhen the intel_context structure contains NULL,\nit raises a NULL pointer dereference error in drm_info().\n\n(cherry picked from commit 754302a5bc1bd8fd3b7d85c168b0a1af6d4bba4d)",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1078"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-56667"
		},
		{
			"cve":"CVE-2024-56672",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nblk-cgroup: Fix UAF in blkcg_unpin_online()\n\nblkcg_unpin_online() walks up the blkcg hierarchy putting the online pin. To\nwalk up, it uses blkcg_parent(blkcg) but it was calling that after\nblkcg_destroy_blkgs(blkcg) which could free the blkcg, leading to the\nfollowing UAF:\n\n  ==================================================================\n  BUG: KASAN: slab-use-after-free in blkcg_unpin_online+0x15a/0x270\n  Read of size 8 at addr ffff8881057678c0 by task kworker/9:1/117\n\n  CPU: 9 UID: 0 PID: 117 Comm: kworker/9:1 Not tainted 6.13.0-rc1-work-00182-gb8f52214c61a-dirty #48\n  Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS unknown 02/02/2022\n  Workqueue: cgwb_release cgwb_release_workfn\n  Call Trace:\n   <TASK>\n   dump_stack_lvl+0x27/0x80\n   print_report+0x151/0x710\n   kasan_report+0xc0/0x100\n   blkcg_unpin_online+0x15a/0x270\n   cgwb_release_workfn+0x194/0x480\n   process_scheduled_works+0x71b/0xe20\n   worker_thread+0x82a/0xbd0\n   kthread+0x242/0x2c0\n   ret_from_fork+0x33/0x70\n   ret_from_fork_asm+0x1a/0x30\n   </TASK>\n  ...\n  Freed by task 1944:\n   kasan_save_track+0x2b/0x70\n   kasan_save_free_info+0x3c/0x50\n   __kasan_slab_free+0x33/0x50\n   kfree+0x10c/0x330\n   css_free_rwork_fn+0xe6/0xb30\n   process_scheduled_works+0x71b/0xe20\n   worker_thread+0x82a/0xbd0\n   kthread+0x242/0x2c0\n   ret_from_fork+0x33/0x70\n   ret_from_fork_asm+0x1a/0x30\n\nNote that the UAF is not easy to trigger as the free path is indirected\nbehind a couple RCU grace periods and a work item execution. I could only\ntrigger it with artifical msleep() injected in blkcg_unpin_online().\n\nFix it by reading the parent pointer before destroying the blkcg's blkg's.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1078"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.0,
						"vectorString":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2024-56672"
		},
		{
			"cve":"CVE-2024-56679",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nocteontx2-pf: handle otx2_mbox_get_rsp errors in otx2_common.c\n\nAdd error pointer check after calling otx2_mbox_get_rsp().",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1078"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"LOW",
						"baseScore":3.9,
						"vectorString":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Low",
					"category":"impact"
				}
			],
			"title":"CVE-2024-56679"
		},
		{
			"cve":"CVE-2024-56691",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nmfd: intel_soc_pmic_bxtwc: Use IRQ domain for USB Type-C device\n\nWhile design wise the idea of converting the driver to use\nthe hierarchy of the IRQ chips is correct, the implementation\nhas (inherited) flaws. This was unveiled when platform_get_irq()\nhad started WARN() on IRQ 0 that is supposed to be a Linux\nIRQ number (also known as vIRQ).\n\nRework the driver to respect IRQ domain when creating each MFD\ndevice separately, as the domain is not the same for all of them.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1078"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"LOW",
						"baseScore":3.9,
						"vectorString":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Low",
					"category":"impact"
				}
			],
			"title":"CVE-2024-56691"
		},
		{
			"cve":"CVE-2024-56720",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nbpf, sockmap: Several fixes to bpf_msg_pop_data\n\nSeveral fixes to bpf_msg_pop_data,\n1. In sk_msg_shift_left, we should put_page\n2. if (len == 0), return early is better\n3. pop the entire sk_msg (last == msg->sg.size) should be supported\n4. Fix for the value of variable \"a\"\n5. In sk_msg_shift_left, after shifting, i has already pointed to the next\nelement. Addtional sk_msg_iter_var_next may result in BUG.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1078"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-56720"
		},
		{
			"cve":"CVE-2024-56726",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nocteontx2-pf: handle otx2_mbox_get_rsp errors in cn10k.c\n\nAdd error pointer check after calling otx2_mbox_get_rsp().",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1078"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-56726"
		},
		{
			"cve":"CVE-2024-56739",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nrtc: check if __rtc_read_time was successful in rtc_timer_do_work()\n\nIf the __rtc_read_time call fails,, the struct rtc_time tm; may contain\nuninitialized data, or an illegal date/time read from the RTC hardware.\n\nWhen calling rtc_tm_to_ktime later, the result may be a very large value\n(possibly KTIME_MAX). If there are periodic timers in rtc->timerqueue,\nthey will continually expire, may causing kernel softlockup.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1078"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-56739"
		},
		{
			"cve":"CVE-2024-56742",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nvfio/mlx5: Fix an unwind issue in mlx5vf_add_migration_pages()\n\nFix an unwind issue in mlx5vf_add_migration_pages().\n\nIf a set of pages is allocated but fails to be added to the SG table,\nthey need to be freed to prevent a memory leak.\n\nAny pages successfully added to the SG table will be freed as part of\nmlx5vf_free_data_buffer().",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1078"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-56742"
		},
		{
			"cve":"CVE-2024-56745",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nPCI: Fix reset_method_store() memory leak\n\nIn reset_method_store(), a string is allocated via kstrndup() and assigned\nto the local \"options\". options is then used in with strsep() to find\nspaces:\n\n  while ((name = strsep(&options, \" \")) != NULL) {\n\nIf there are no remaining spaces, then options is set to NULL by strsep(),\nso the subsequent kfree(options) doesn't free the memory allocated via\nkstrndup().\n\nFix by using a separate tmp_options to iterate with strsep() so options is\npreserved.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1078"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-56745"
		},
		{
			"cve":"CVE-2024-56747",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: qedi: Fix a possible memory leak in qedi_alloc_and_init_sb()\n\nHook \"qedi_ops->common->sb_init = qed_sb_init\" does not release the DMA\nmemory sb_virt when it fails. Add dma_free_coherent() to free it. This\nis the same way as qedr_alloc_mem_sb() and qede_alloc_mem_sb().",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1078"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-56747"
		},
		{
			"cve":"CVE-2024-56755",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nnetfs/fscache: Add a memory barrier for FSCACHE_VOLUME_CREATING\n\nIn fscache_create_volume(), there is a missing memory barrier between the\nbit-clearing operation and the wake-up operation. This may cause a\nsituation where, after a wake-up, the bit-clearing operation hasn't been\ndetected yet, leading to an indefinite wait. The triggering process is as\nfollows:\n\n  [cookie1]                [cookie2]                  [volume_work]\nfscache_perform_lookup\n  fscache_create_volume\n                        fscache_perform_lookup\n                          fscache_create_volume\n\t\t\t                        fscache_create_volume_work\n                                                  cachefiles_acquire_volume\n                                                  clear_and_wake_up_bit\n    test_and_set_bit\n                            test_and_set_bit\n                              goto maybe_wait\n      goto no_wait\n\nIn the above process, cookie1 and cookie2 has the same volume. When cookie1\nenters the -no_wait- process, it will clear the bit and wake up the waiting\nprocess. If a barrier is missing, it may cause cookie2 to remain in the\n-wait- process indefinitely.\n\nIn commit 3288666c7256 (\"fscache: Use clear_and_wake_up_bit() in\nfscache_create_volume_work()\"), barriers were added to similar operations\nin fscache_create_volume_work(), but fscache_create_volume() was missed.\n\nBy combining the clear and wake operations into clear_and_wake_up_bit() to\nfix this issue.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1078"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-56755"
		},
		{
			"cve":"CVE-2024-56756",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nnvme-pci: fix freeing of the HMB descriptor table\n\nThe HMB descriptor table is sized to the maximum number of descriptors\nthat could be used for a given device, but __nvme_alloc_host_mem could\nbreak out of the loop earlier on memory allocation failure and end up\nusing less descriptors than planned for, which leads to an incorrect\nsize passed to dma_free_coherent.\n\nIn practice this was not showing up because the number of descriptors\ntends to be low and the dma coherent allocator always allocates and\nfrees at least a page.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1078"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-56756"
		},
		{
			"cve":"CVE-2024-56759",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: fix use-after-free when COWing tree bock and tracing is enabled\n\nWhen a COWing a tree block, at btrfs_cow_block(), and we have the\ntracepoint trace_btrfs_cow_block() enabled and preemption is also enabled\n(CONFIG_PREEMPT=y), we can trigger a use-after-free in the COWed extent\nbuffer while inside the tracepoint code. This is because in some paths\nthat call btrfs_cow_block(), such as btrfs_search_slot(), we are holding\nthe last reference on the extent buffer @buf so btrfs_force_cow_block()\ndrops the last reference on the @buf extent buffer when it calls\nfree_extent_buffer_stale(buf), which schedules the release of the extent\nbuffer with RCU. This means that if we are on a kernel with preemption,\nthe current task may be preempted before calling trace_btrfs_cow_block()\nand the extent buffer already released by the time trace_btrfs_cow_block()\nis called, resulting in a use-after-free.\n\nFix this by moving the trace_btrfs_cow_block() from btrfs_cow_block() to\nbtrfs_force_cow_block() before the COWed extent buffer is freed.\nThis also has a side effect of invoking the tracepoint in the tree defrag\ncode, at defrag.c:btrfs_realloc_node(), since btrfs_force_cow_block() is\ncalled there, but this is fine and it was actually missing there.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1078"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.8,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2024-56759"
		},
		{
			"cve":"CVE-2024-56763",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\ntracing: Prevent bad count for tracing_cpumask_write\n\nIf a large count is provided, it will trigger a warning in bitmap_parse_user.\nAlso check zero for it.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1078"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-75.0.0.68.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-75.0.0.68.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-56763"
		}
	]
}