{
	"document":{
		"aggregate_severity":{
			"namespace":"https://nvd.nist.gov/vuln-metrics/cvss",
			"text":"High"
		},
		"category":"csaf_vex",
		"csaf_version":"2.0",
		"distribution":{
			"tlp":{
				"label":"WHITE",
				"url":"https:/www.first.org/tlp/"
			}
		},
		"lang":"en",
		"notes":[
			{
				"text":"kernel security update",
				"category":"general",
				"title":"Synopsis"
			},
			{
				"text":"An update for kernel is now available for openEuler-20.03-LTS-SP4",
				"category":"general",
				"title":"Summary"
			},
			{
				"text":"The Linux Kernel, the operating system core itself.\n\nSecurity Fix(es):\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nipv6: ensure sane device mtu in tunnels\n\nAnother syzbot report [1] with no reproducer hints\nat a bug in ip6_gre tunnel (dev:ip6gretap0)\n\nSince ipv6 mcast code makes sure to read dev->mtu once\nand applies a sanity check on it (see commit b9b312a7a451\n\"ipv6: mcast: better catch silly mtu values\"), a remaining\npossibility is that a layer is able to set dev->mtu to\nan underflowed value (high order bit set).\n\nThis could happen indeed in ip6gre_tnl_link_config_route(),\nip6_tnl_link_config() and ipip6_tunnel_bind_dev()\n\nMake sure to sanitize mtu value in a local variable before\nit is written once on dev->mtu, as lockless readers could\ncatch wrong temporary value.\n\n[1]\nskbuff: skb_over_panic: text:ffff80000b7a2f38 len:40 put:40 head:ffff000149dcf200 data:ffff000149dcf2b0 tail:0xd8 end:0xc0 dev:ip6gretap0\n------------[ cut here ]------------\nkernel BUG at net/core/skbuff.c:120\nInternal error: Oops - BUG: 00000000f2000800 [#1] PREEMPT SMP\nModules linked in:\nCPU: 1 PID: 10241 Comm: kworker/1:1 Not tainted 6.0.0-rc7-syzkaller-18095-gbbed346d5a96 #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/30/2022\nWorkqueue: mld mld_ifc_work\npstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)\npc : skb_panic+0x4c/0x50 net/core/skbuff.c:116\nlr : skb_panic+0x4c/0x50 net/core/skbuff.c:116\nsp : ffff800020dd3b60\nx29: ffff800020dd3b70 x28: 0000000000000000 x27: ffff00010df2a800\nx26: 00000000000000c0 x25: 00000000000000b0 x24: ffff000149dcf200\nx23: 00000000000000c0 x22: 00000000000000d8 x21: ffff80000b7a2f38\nx20: ffff00014c2f7800 x19: 0000000000000028 x18: 00000000000001a9\nx17: 0000000000000000 x16: ffff80000db49158 x15: ffff000113bf1a80\nx14: 0000000000000000 x13: 00000000ffffffff x12: ffff000113bf1a80\nx11: ff808000081c0d5c x10: 0000000000000000 x9 : 73f125dc5c63ba00\nx8 : 73f125dc5c63ba00 x7 : ffff800008161d1c x6 : 0000000000000000\nx5 : 0000000000000080 x4 : 0000000000000001 x3 : 0000000000000000\nx2 : ffff0001fefddcd0 x1 : 0000000100000000 x0 : 0000000000000089\nCall trace:\nskb_panic+0x4c/0x50 net/core/skbuff.c:116\nskb_over_panic net/core/skbuff.c:125 [inline]\nskb_put+0xd4/0xdc net/core/skbuff.c:2049\nip6_mc_hdr net/ipv6/mcast.c:1714 [inline]\nmld_newpack+0x14c/0x270 net/ipv6/mcast.c:1765\nadd_grhead net/ipv6/mcast.c:1851 [inline]\nadd_grec+0xa20/0xae0 net/ipv6/mcast.c:1989\nmld_send_cr+0x438/0x5a8 net/ipv6/mcast.c:2115\nmld_ifc_work+0x38/0x290 net/ipv6/mcast.c:2653\nprocess_one_work+0x2d8/0x504 kernel/workqueue.c:2289\nworker_thread+0x340/0x610 kernel/workqueue.c:2436\nkthread+0x12c/0x158 kernel/kthread.c:376\nret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:860\nCode: 91011400 aa0803e1 a90027ea 94373093 (d4210000)(CVE-2022-50816)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\ntpm: tpm_tis: Add the missed acpi_put_table() to fix memory leak\n\nIn check_acpi_tpm2(), we get the TPM2 table just to make\nsure the table is there, not used after the init, so the\nacpi_put_table() should be added to release the ACPI memory.(CVE-2022-50824)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nmmc: via-sdmmc: fix return value check of mmc_add_host()\n\nmmc_add_host() may return error, if we ignore its return value,\nit will lead two issues:\n1. The memory that allocated in mmc_alloc_host() is leaked.\n2. In the remove() path, mmc_remove_host() will be called to\n   delete device, but it's not added yet, it will lead a kernel\n   crash because of null-ptr-deref in device_del().\n\nFix this by checking the return value and goto error path which\nwill call mmc_free_host().(CVE-2022-50846)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nscsi: ipr: Fix WARNING in ipr_init()\n\nipr_init() will not call unregister_reboot_notifier() when\npci_register_driver() fails, which causes a WARNING. Call\nunregister_reboot_notifier() when pci_register_driver() fails.\n\nnotifier callback ipr_halt [ipr] already registered\nWARNING: CPU: 3 PID: 299 at kernel/notifier.c:29\nnotifier_chain_register+0x16d/0x230\nModules linked in: ipr(+) xhci_pci_renesas xhci_hcd ehci_hcd usbcore\nled_class gpu_sched drm_buddy video wmi drm_ttm_helper ttm\ndrm_display_helper drm_kms_helper drm drm_panel_orientation_quirks\nagpgart cfbft\nCPU: 3 PID: 299 Comm: modprobe Tainted: G        W\n6.1.0-rc1-00190-g39508d23b672-dirty #332\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS\nrel-1.15.0-0-g2dd4b9b3f840-prebuilt.qemu.org 04/01/2014\nRIP: 0010:notifier_chain_register+0x16d/0x230\nCall Trace:\n <TASK>\n __blocking_notifier_chain_register+0x73/0xb0\n ipr_init+0x30/0x1000 [ipr]\n do_one_initcall+0xdb/0x480\n do_init_module+0x1cf/0x680\n load_module+0x6a50/0x70a0\n __do_sys_finit_module+0x12f/0x1c0\n do_syscall_64+0x3f/0x90\n entry_SYSCALL_64_after_hwframe+0x63/0xcd(CVE-2022-50850)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/rxe: Fix NULL-ptr-deref in rxe_qp_do_cleanup() when socket create failed\n\nThere is a null-ptr-deref when mount.cifs over rdma:\n\n  BUG: KASAN: null-ptr-deref in rxe_qp_do_cleanup+0x2f3/0x360 [rdma_rxe]\n  Read of size 8 at addr 0000000000000018 by task mount.cifs/3046\n\n  CPU: 2 PID: 3046 Comm: mount.cifs Not tainted 6.1.0-rc5+ #62\n  Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.14.0-1.fc3\n  Call Trace:\n   <TASK>\n   dump_stack_lvl+0x34/0x44\n   kasan_report+0xad/0x130\n   rxe_qp_do_cleanup+0x2f3/0x360 [rdma_rxe]\n   execute_in_process_context+0x25/0x90\n   __rxe_cleanup+0x101/0x1d0 [rdma_rxe]\n   rxe_create_qp+0x16a/0x180 [rdma_rxe]\n   create_qp.part.0+0x27d/0x340\n   ib_create_qp_kernel+0x73/0x160\n   rdma_create_qp+0x100/0x230\n   _smbd_get_connection+0x752/0x20f0\n   smbd_get_connection+0x21/0x40\n   cifs_get_tcp_session+0x8ef/0xda0\n   mount_get_conns+0x60/0x750\n   cifs_mount+0x103/0xd00\n   cifs_smb3_do_mount+0x1dd/0xcb0\n   smb3_get_tree+0x1d5/0x300\n   vfs_get_tree+0x41/0xf0\n   path_mount+0x9b3/0xdd0\n   __x64_sys_mount+0x190/0x1d0\n   do_syscall_64+0x35/0x80\n   entry_SYSCALL_64_after_hwframe+0x46/0xb0\n\nThe root cause of the issue is the socket create failed in\nrxe_qp_init_req().\n\nSo move the reset rxe_qp_do_cleanup() after the NULL ptr check.(CVE-2022-50885)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nubi: Fix possible null-ptr-deref in ubi_free_volume()\n\nIt willl cause null-ptr-deref in the following case:\n\nuif_init()\n  ubi_add_volume()\n    cdev_add() -> if it fails, call kill_volumes()\n    device_register()\n\nkill_volumes() -> if ubi_add_volume() fails call this function\n  ubi_free_volume()\n    cdev_del()\n    device_unregister() -> trying to delete a not added device,\n\t\t\t   it causes null-ptr-deref\n\nSo in ubi_free_volume(), it delete devices whether they are added\nor not, it will causes null-ptr-deref.\n\nHandle the error case whlie calling ubi_add_volume() to fix this\nproblem. If add volume fails, set the corresponding vol to null,\nso it can not be accessed in kill_volumes() and release the\nresource in ubi_add_volume() error path.(CVE-2023-54087)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nusb: rndis_host: Secure rndis_query check against int overflow\n\nVariables off and len typed as uint32 in rndis_query function\nare controlled by incoming RNDIS response message thus their\nvalue may be manipulated. Setting off to a unexpectetly large\nvalue will cause the sum with len and 8 to overflow and pass\nthe implemented validation step. Consequently the response\npointer will be referring to a location past the expected\nbuffer boundaries allowing information leakage e.g. via\nRNDIS_OID_802_3_PERMANENT_ADDRESS OID.(CVE-2023-54110)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nscsi: qla2xxx: Array index may go out of bound\n\nKlocwork reports array 'vha->host_str' of size 16 may use index value(s)\n16..19.  Use snprintf() instead of sprintf().(CVE-2023-54179)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nnet: Fix load-tearing on sk->sk_stamp in sock_recv_cmsgs().\n\nKCSAN found a data race in sock_recv_cmsgs() where the read access\nto sk->sk_stamp needs READ_ONCE().\n\nBUG: KCSAN: data-race in packet_recvmsg / packet_recvmsg\n\nwrite (marked) to 0xffff88803c81f258 of 8 bytes by task 19171 on cpu 0:\n sock_write_timestamp include/net/sock.h:2670 [inline]\n sock_recv_cmsgs include/net/sock.h:2722 [inline]\n packet_recvmsg+0xb97/0xd00 net/packet/af_packet.c:3489\n sock_recvmsg_nosec net/socket.c:1019 [inline]\n sock_recvmsg+0x11a/0x130 net/socket.c:1040\n sock_read_iter+0x176/0x220 net/socket.c:1118\n call_read_iter include/linux/fs.h:1845 [inline]\n new_sync_read fs/read_write.c:389 [inline]\n vfs_read+0x5e0/0x630 fs/read_write.c:470\n ksys_read+0x163/0x1a0 fs/read_write.c:613\n __do_sys_read fs/read_write.c:623 [inline]\n __se_sys_read fs/read_write.c:621 [inline]\n __x64_sys_read+0x41/0x50 fs/read_write.c:621\n do_syscall_x64 arch/x86/entry/common.c:50 [inline]\n do_syscall_64+0x3b/0x90 arch/x86/entry/common.c:80\n entry_SYSCALL_64_after_hwframe+0x72/0xdc\n\nread to 0xffff88803c81f258 of 8 bytes by task 19183 on cpu 1:\n sock_recv_cmsgs include/net/sock.h:2721 [inline]\n packet_recvmsg+0xb64/0xd00 net/packet/af_packet.c:3489\n sock_recvmsg_nosec net/socket.c:1019 [inline]\n sock_recvmsg+0x11a/0x130 net/socket.c:1040\n sock_read_iter+0x176/0x220 net/socket.c:1118\n call_read_iter include/linux/fs.h:1845 [inline]\n new_sync_read fs/read_write.c:389 [inline]\n vfs_read+0x5e0/0x630 fs/read_write.c:470\n ksys_read+0x163/0x1a0 fs/read_write.c:613\n __do_sys_read fs/read_write.c:623 [inline]\n __se_sys_read fs/read_write.c:621 [inline]\n __x64_sys_read+0x41/0x50 fs/read_write.c:621\n do_syscall_x64 arch/x86/entry/common.c:50 [inline]\n do_syscall_64+0x3b/0x90 arch/x86/entry/common.c:80\n entry_SYSCALL_64_after_hwframe+0x72/0xdc\n\nvalue changed: 0xffffffffc4653600 -> 0x0000000000000000\n\nReported by Kernel Concurrency Sanitizer on:\nCPU: 1 PID: 19183 Comm: syz-executor.5 Not tainted 6.3.0-rc7-02330-gca6270c12e20 #2\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.0-0-gd239552ce722-prebuilt.qemu.org 04/01/2014(CVE-2023-54218)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Address KCSAN report on bpf_lru_list\n\nKCSAN reported a data-race when accessing node->ref.\nAlthough node->ref does not have to be accurate,\ntake this chance to use a more common READ_ONCE() and WRITE_ONCE()\npattern instead of data_race().\n\nThere is an existing bpf_lru_node_is_ref() and bpf_lru_node_set_ref().\nThis patch also adds bpf_lru_node_clear_ref() to do the\nWRITE_ONCE(node->ref, 0) also.\n\n==================================================================\nBUG: KCSAN: data-race in __bpf_lru_list_rotate / __htab_lru_percpu_map_update_elem\n\nwrite to 0xffff888137038deb of 1 bytes by task 11240 on cpu 1:\n__bpf_lru_node_move kernel/bpf/bpf_lru_list.c:113 [inline]\n__bpf_lru_list_rotate_active kernel/bpf/bpf_lru_list.c:149 [inline]\n__bpf_lru_list_rotate+0x1bf/0x750 kernel/bpf/bpf_lru_list.c:240\nbpf_lru_list_pop_free_to_local kernel/bpf/bpf_lru_list.c:329 [inline]\nbpf_common_lru_pop_free kernel/bpf/bpf_lru_list.c:447 [inline]\nbpf_lru_pop_free+0x638/0xe20 kernel/bpf/bpf_lru_list.c:499\nprealloc_lru_pop kernel/bpf/hashtab.c:290 [inline]\n__htab_lru_percpu_map_update_elem+0xe7/0x820 kernel/bpf/hashtab.c:1316\nbpf_percpu_hash_update+0x5e/0x90 kernel/bpf/hashtab.c:2313\nbpf_map_update_value+0x2a9/0x370 kernel/bpf/syscall.c:200\ngeneric_map_update_batch+0x3ae/0x4f0 kernel/bpf/syscall.c:1687\nbpf_map_do_batch+0x2d9/0x3d0 kernel/bpf/syscall.c:4534\n__sys_bpf+0x338/0x810\n__do_sys_bpf kernel/bpf/syscall.c:5096 [inline]\n__se_sys_bpf kernel/bpf/syscall.c:5094 [inline]\n__x64_sys_bpf+0x43/0x50 kernel/bpf/syscall.c:5094\ndo_syscall_x64 arch/x86/entry/common.c:50 [inline]\ndo_syscall_64+0x41/0xc0 arch/x86/entry/common.c:80\nentry_SYSCALL_64_after_hwframe+0x63/0xcd\n\nread to 0xffff888137038deb of 1 bytes by task 11241 on cpu 0:\nbpf_lru_node_set_ref kernel/bpf/bpf_lru_list.h:70 [inline]\n__htab_lru_percpu_map_update_elem+0x2f1/0x820 kernel/bpf/hashtab.c:1332\nbpf_percpu_hash_update+0x5e/0x90 kernel/bpf/hashtab.c:2313\nbpf_map_update_value+0x2a9/0x370 kernel/bpf/syscall.c:200\ngeneric_map_update_batch+0x3ae/0x4f0 kernel/bpf/syscall.c:1687\nbpf_map_do_batch+0x2d9/0x3d0 kernel/bpf/syscall.c:4534\n__sys_bpf+0x338/0x810\n__do_sys_bpf kernel/bpf/syscall.c:5096 [inline]\n__se_sys_bpf kernel/bpf/syscall.c:5094 [inline]\n__x64_sys_bpf+0x43/0x50 kernel/bpf/syscall.c:5094\ndo_syscall_x64 arch/x86/entry/common.c:50 [inline]\ndo_syscall_64+0x41/0xc0 arch/x86/entry/common.c:80\nentry_SYSCALL_64_after_hwframe+0x63/0xcd\n\nvalue changed: 0x01 -> 0x00\n\nReported by Kernel Concurrency Sanitizer on:\nCPU: 0 PID: 11241 Comm: syz-executor.3 Not tainted 6.3.0-rc7-syzkaller-00136-g6a66fdd29ea1 #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/30/2023\n==================================================================(CVE-2023-54283)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nipv4: route: Prevent rt_bind_exception() from rebinding stale fnhe\n\nThe sit driver's packet transmission path calls: sit_tunnel_xmit() ->\nupdate_or_create_fnhe(), which lead to fnhe_remove_oldest() being called\nto delete entries exceeding FNHE_RECLAIM_DEPTH+random.\n\nThe race window is between fnhe_remove_oldest() selecting fnheX for\ndeletion and the subsequent kfree_rcu(). During this time, the\nconcurrent path's __mkroute_output() -> find_exception() can fetch the\nsoon-to-be-deleted fnheX, and rt_bind_exception() then binds it with a\nnew dst using a dst_hold(). When the original fnheX is freed via RCU,\nthe dst reference remains permanently leaked.\n\nCPU 0                             CPU 1\n__mkroute_output()\n  find_exception() [fnheX]\n                                  update_or_create_fnhe()\n                                    fnhe_remove_oldest() [fnheX]\n  rt_bind_exception() [bind dst]\n                                  RCU callback [fnheX freed, dst leak]\n\nThis issue manifests as a device reference count leak and a warning in\ndmesg when unregistering the net device:\n\n  unregister_netdevice: waiting for sitX to become free. Usage count = N\n\nIdo Schimmel provided the simple test validation method [1].\n\nThe fix clears 'oldest->fnhe_daddr' before calling fnhe_flush_routes().\nSince rt_bind_exception() checks this field, setting it to zero prevents\nthe stale fnhe from being reused and bound to a new dst just before it\nis freed.\n\n[1]\nip netns add ns1\nip -n ns1 link set dev lo up\nip -n ns1 address add 192.0.2.1/32 dev lo\nip -n ns1 link add name dummy1 up type dummy\nip -n ns1 route add 192.0.2.2/32 dev dummy1\nip -n ns1 link add name gretap1 up arp off type gretap \\\n    local 192.0.2.1 remote 192.0.2.2\nip -n ns1 route add 198.51.0.0/16 dev gretap1\ntaskset -c 0 ip netns exec ns1 mausezahn gretap1 \\\n    -A 198.51.100.1 -B 198.51.0.0/16 -t udp -p 1000 -c 0 -q &\ntaskset -c 2 ip netns exec ns1 mausezahn gretap1 \\\n    -A 198.51.100.1 -B 198.51.0.0/16 -t udp -p 1000 -c 0 -q &\nsleep 10\nip netns pids ns1 | xargs kill\nip netns del ns1(CVE-2025-68241)\n\nIn the Linux kernel, a buffer overflow vulnerability exists in the e1000 network driver's e1000_tbi_should_accept() function. The function reads the last byte of the frame via 'data[length - 1]' to evaluate the TBI (Tunnel Bypass Identifier) workaround. If the descriptor-reported length is zero or larger than the actual RX buffer size, this read goes out of bounds and can hit unrelated slab objects. The issue is observed from the NAPI receive path (e1000_clean_rx_irq). The root cause is that the TBI check unconditionally dereferences the last byte without validating the reported length first. The fix rejects the frame early if the length is zero or exceeds adapter->rx_buffer_len, preserving the TBI workaround semantics for valid frames and preventing touching memory beyond the RX buffer.(CVE-2025-71093)",
				"category":"general",
				"title":"Description"
			},
			{
				"text":"An update for kernel is now available for openEuler-20.03-LTS-SP4.\n\nopenEuler Security has rated this update as having a security impact of high. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.",
				"category":"general",
				"title":"Topic"
			},
			{
				"text":"High",
				"category":"general",
				"title":"Severity"
			},
			{
				"text":"kernel",
				"category":"general",
				"title":"Affected Component"
			}
		],
		"publisher":{
			"issuing_authority":"openEuler security committee",
			"name":"openEuler",
			"namespace":"https://www.openeuler.org",
			"contact_details":"openeuler-security@openeuler.org",
			"category":"vendor"
		},
		"references":[
			{
				"summary":"openEuler-SA-2026-1276",
				"category":"self",
				"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-1276"
			},
			{
				"summary":"CVE-2022-50816",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2022-50816&packageName=kernel"
			},
			{
				"summary":"CVE-2022-50824",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2022-50824&packageName=kernel"
			},
			{
				"summary":"CVE-2022-50846",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2022-50846&packageName=kernel"
			},
			{
				"summary":"CVE-2022-50850",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2022-50850&packageName=kernel"
			},
			{
				"summary":"CVE-2022-50885",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2022-50885&packageName=kernel"
			},
			{
				"summary":"CVE-2023-54087",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2023-54087&packageName=kernel"
			},
			{
				"summary":"CVE-2023-54110",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2023-54110&packageName=kernel"
			},
			{
				"summary":"CVE-2023-54179",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2023-54179&packageName=kernel"
			},
			{
				"summary":"CVE-2023-54218",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2023-54218&packageName=kernel"
			},
			{
				"summary":"CVE-2023-54283",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2023-54283&packageName=kernel"
			},
			{
				"summary":"CVE-2025-68241",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-68241&packageName=kernel"
			},
			{
				"summary":"CVE-2025-71093",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-71093&packageName=kernel"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50816"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50824"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50846"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50850"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50885"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-54087"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-54110"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-54179"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-54218"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-54283"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-68241"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-71093"
			},
			{
				"summary":"openEuler-SA-2026-1276 vex file",
				"category":"self",
				"url":"https://repo.openeuler.org/security/data/csaf/advisories/2026/csaf-openeuler-sa-2026-1276.json"
			}
		],
		"title":"An update for kernel is now available for openEuler-20.03-LTS-SP4",
		"tracking":{
			"initial_release_date":"2026-02-03T16:14:09+08:00",
			"revision_history":[
				{
					"date":"2026-02-03T16:14:09+08:00",
					"summary":"Initial",
					"number":"1.0.0"
				}
			],
			"generator":{
				"date":"2026-02-03T16:14:09+08:00",
				"engine":{
					"name":"openEuler CSAF Tool V1.0"
				}
			},
			"current_release_date":"2026-02-03T16:14:09+08:00",
			"id":"openEuler-SA-2026-1276",
			"version":"1.0.0",
			"status":"final"
		}
	},
	"product_tree":{
		"branches":[
			{
				"name":"openEuler",
				"category":"vendor",
				"branches":[
					{
						"name":"openEuler",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:20.03-LTS-SP4"
									},
									"product_id":"openEuler-20.03-LTS-SP4",
									"name":"openEuler-20.03-LTS-SP4"
								},
								"name":"openEuler-20.03-LTS-SP4",
								"category":"product_version"
							}
						],
						"category":"product_name"
					},
					{
						"name":"aarch64",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:20.03-LTS-SP4"
									},
									"product_id":"bpftool-4.19.90-2601.5.0.0360.oe2003sp4.aarch64.rpm",
									"name":"bpftool-4.19.90-2601.5.0.0360.oe2003sp4.aarch64.rpm"
								},
								"name":"bpftool-4.19.90-2601.5.0.0360.oe2003sp4.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:20.03-LTS-SP4"
									},
									"product_id":"bpftool-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64.rpm",
									"name":"bpftool-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64.rpm"
								},
								"name":"bpftool-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:20.03-LTS-SP4"
									},
									"product_id":"kernel-4.19.90-2601.5.0.0360.oe2003sp4.aarch64.rpm",
									"name":"kernel-4.19.90-2601.5.0.0360.oe2003sp4.aarch64.rpm"
								},
								"name":"kernel-4.19.90-2601.5.0.0360.oe2003sp4.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:20.03-LTS-SP4"
									},
									"product_id":"kernel-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64.rpm",
									"name":"kernel-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64.rpm"
								},
								"name":"kernel-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:20.03-LTS-SP4"
									},
									"product_id":"kernel-debugsource-4.19.90-2601.5.0.0360.oe2003sp4.aarch64.rpm",
									"name":"kernel-debugsource-4.19.90-2601.5.0.0360.oe2003sp4.aarch64.rpm"
								},
								"name":"kernel-debugsource-4.19.90-2601.5.0.0360.oe2003sp4.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:20.03-LTS-SP4"
									},
									"product_id":"kernel-devel-4.19.90-2601.5.0.0360.oe2003sp4.aarch64.rpm",
									"name":"kernel-devel-4.19.90-2601.5.0.0360.oe2003sp4.aarch64.rpm"
								},
								"name":"kernel-devel-4.19.90-2601.5.0.0360.oe2003sp4.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:20.03-LTS-SP4"
									},
									"product_id":"kernel-source-4.19.90-2601.5.0.0360.oe2003sp4.aarch64.rpm",
									"name":"kernel-source-4.19.90-2601.5.0.0360.oe2003sp4.aarch64.rpm"
								},
								"name":"kernel-source-4.19.90-2601.5.0.0360.oe2003sp4.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:20.03-LTS-SP4"
									},
									"product_id":"kernel-tools-4.19.90-2601.5.0.0360.oe2003sp4.aarch64.rpm",
									"name":"kernel-tools-4.19.90-2601.5.0.0360.oe2003sp4.aarch64.rpm"
								},
								"name":"kernel-tools-4.19.90-2601.5.0.0360.oe2003sp4.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:20.03-LTS-SP4"
									},
									"product_id":"kernel-tools-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64.rpm",
									"name":"kernel-tools-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64.rpm"
								},
								"name":"kernel-tools-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:20.03-LTS-SP4"
									},
									"product_id":"kernel-tools-devel-4.19.90-2601.5.0.0360.oe2003sp4.aarch64.rpm",
									"name":"kernel-tools-devel-4.19.90-2601.5.0.0360.oe2003sp4.aarch64.rpm"
								},
								"name":"kernel-tools-devel-4.19.90-2601.5.0.0360.oe2003sp4.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:20.03-LTS-SP4"
									},
									"product_id":"perf-4.19.90-2601.5.0.0360.oe2003sp4.aarch64.rpm",
									"name":"perf-4.19.90-2601.5.0.0360.oe2003sp4.aarch64.rpm"
								},
								"name":"perf-4.19.90-2601.5.0.0360.oe2003sp4.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:20.03-LTS-SP4"
									},
									"product_id":"perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64.rpm",
									"name":"perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64.rpm"
								},
								"name":"perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:20.03-LTS-SP4"
									},
									"product_id":"python2-perf-4.19.90-2601.5.0.0360.oe2003sp4.aarch64.rpm",
									"name":"python2-perf-4.19.90-2601.5.0.0360.oe2003sp4.aarch64.rpm"
								},
								"name":"python2-perf-4.19.90-2601.5.0.0360.oe2003sp4.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:20.03-LTS-SP4"
									},
									"product_id":"python2-perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64.rpm",
									"name":"python2-perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64.rpm"
								},
								"name":"python2-perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:20.03-LTS-SP4"
									},
									"product_id":"python3-perf-4.19.90-2601.5.0.0360.oe2003sp4.aarch64.rpm",
									"name":"python3-perf-4.19.90-2601.5.0.0360.oe2003sp4.aarch64.rpm"
								},
								"name":"python3-perf-4.19.90-2601.5.0.0360.oe2003sp4.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:20.03-LTS-SP4"
									},
									"product_id":"python3-perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64.rpm",
									"name":"python3-perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64.rpm"
								},
								"name":"python3-perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64.rpm",
								"category":"product_version"
							}
						],
						"category":"architecture"
					},
					{
						"name":"x86_64",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:20.03-LTS-SP4"
									},
									"product_id":"bpftool-4.19.90-2601.5.0.0360.oe2003sp4.x86_64.rpm",
									"name":"bpftool-4.19.90-2601.5.0.0360.oe2003sp4.x86_64.rpm"
								},
								"name":"bpftool-4.19.90-2601.5.0.0360.oe2003sp4.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:20.03-LTS-SP4"
									},
									"product_id":"bpftool-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64.rpm",
									"name":"bpftool-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64.rpm"
								},
								"name":"bpftool-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:20.03-LTS-SP4"
									},
									"product_id":"kernel-4.19.90-2601.5.0.0360.oe2003sp4.x86_64.rpm",
									"name":"kernel-4.19.90-2601.5.0.0360.oe2003sp4.x86_64.rpm"
								},
								"name":"kernel-4.19.90-2601.5.0.0360.oe2003sp4.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:20.03-LTS-SP4"
									},
									"product_id":"kernel-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64.rpm",
									"name":"kernel-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64.rpm"
								},
								"name":"kernel-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:20.03-LTS-SP4"
									},
									"product_id":"kernel-debugsource-4.19.90-2601.5.0.0360.oe2003sp4.x86_64.rpm",
									"name":"kernel-debugsource-4.19.90-2601.5.0.0360.oe2003sp4.x86_64.rpm"
								},
								"name":"kernel-debugsource-4.19.90-2601.5.0.0360.oe2003sp4.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:20.03-LTS-SP4"
									},
									"product_id":"kernel-devel-4.19.90-2601.5.0.0360.oe2003sp4.x86_64.rpm",
									"name":"kernel-devel-4.19.90-2601.5.0.0360.oe2003sp4.x86_64.rpm"
								},
								"name":"kernel-devel-4.19.90-2601.5.0.0360.oe2003sp4.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:20.03-LTS-SP4"
									},
									"product_id":"kernel-source-4.19.90-2601.5.0.0360.oe2003sp4.x86_64.rpm",
									"name":"kernel-source-4.19.90-2601.5.0.0360.oe2003sp4.x86_64.rpm"
								},
								"name":"kernel-source-4.19.90-2601.5.0.0360.oe2003sp4.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:20.03-LTS-SP4"
									},
									"product_id":"kernel-tools-4.19.90-2601.5.0.0360.oe2003sp4.x86_64.rpm",
									"name":"kernel-tools-4.19.90-2601.5.0.0360.oe2003sp4.x86_64.rpm"
								},
								"name":"kernel-tools-4.19.90-2601.5.0.0360.oe2003sp4.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:20.03-LTS-SP4"
									},
									"product_id":"kernel-tools-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64.rpm",
									"name":"kernel-tools-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64.rpm"
								},
								"name":"kernel-tools-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:20.03-LTS-SP4"
									},
									"product_id":"kernel-tools-devel-4.19.90-2601.5.0.0360.oe2003sp4.x86_64.rpm",
									"name":"kernel-tools-devel-4.19.90-2601.5.0.0360.oe2003sp4.x86_64.rpm"
								},
								"name":"kernel-tools-devel-4.19.90-2601.5.0.0360.oe2003sp4.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:20.03-LTS-SP4"
									},
									"product_id":"perf-4.19.90-2601.5.0.0360.oe2003sp4.x86_64.rpm",
									"name":"perf-4.19.90-2601.5.0.0360.oe2003sp4.x86_64.rpm"
								},
								"name":"perf-4.19.90-2601.5.0.0360.oe2003sp4.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:20.03-LTS-SP4"
									},
									"product_id":"perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64.rpm",
									"name":"perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64.rpm"
								},
								"name":"perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:20.03-LTS-SP4"
									},
									"product_id":"python2-perf-4.19.90-2601.5.0.0360.oe2003sp4.x86_64.rpm",
									"name":"python2-perf-4.19.90-2601.5.0.0360.oe2003sp4.x86_64.rpm"
								},
								"name":"python2-perf-4.19.90-2601.5.0.0360.oe2003sp4.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:20.03-LTS-SP4"
									},
									"product_id":"python2-perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64.rpm",
									"name":"python2-perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64.rpm"
								},
								"name":"python2-perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:20.03-LTS-SP4"
									},
									"product_id":"python3-perf-4.19.90-2601.5.0.0360.oe2003sp4.x86_64.rpm",
									"name":"python3-perf-4.19.90-2601.5.0.0360.oe2003sp4.x86_64.rpm"
								},
								"name":"python3-perf-4.19.90-2601.5.0.0360.oe2003sp4.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:20.03-LTS-SP4"
									},
									"product_id":"python3-perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64.rpm",
									"name":"python3-perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64.rpm"
								},
								"name":"python3-perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64.rpm",
								"category":"product_version"
							}
						],
						"category":"architecture"
					},
					{
						"name":"src",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:20.03-LTS-SP4"
									},
									"product_id":"kernel-4.19.90-2601.5.0.0360.oe2003sp4.src.rpm",
									"name":"kernel-4.19.90-2601.5.0.0360.oe2003sp4.src.rpm"
								},
								"name":"kernel-4.19.90-2601.5.0.0360.oe2003sp4.src.rpm",
								"category":"product_version"
							}
						],
						"category":"architecture"
					}
				]
			}
		],
		"relationships":[
			{
				"relates_to_product_reference":"openEuler-20.03-LTS-SP4",
				"product_reference":"bpftool-4.19.90-2601.5.0.0360.oe2003sp4.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-20.03-LTS-SP4:bpftool-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"name":"bpftool-4.19.90-2601.5.0.0360.oe2003sp4.aarch64 as a component of openEuler-20.03-LTS-SP4"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-20.03-LTS-SP4",
				"product_reference":"bpftool-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-20.03-LTS-SP4:bpftool-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"name":"bpftool-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64 as a component of openEuler-20.03-LTS-SP4"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-20.03-LTS-SP4",
				"product_reference":"kernel-4.19.90-2601.5.0.0360.oe2003sp4.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-20.03-LTS-SP4:kernel-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"name":"kernel-4.19.90-2601.5.0.0360.oe2003sp4.aarch64 as a component of openEuler-20.03-LTS-SP4"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-20.03-LTS-SP4",
				"product_reference":"kernel-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-20.03-LTS-SP4:kernel-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"name":"kernel-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64 as a component of openEuler-20.03-LTS-SP4"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-20.03-LTS-SP4",
				"product_reference":"kernel-debugsource-4.19.90-2601.5.0.0360.oe2003sp4.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-20.03-LTS-SP4:kernel-debugsource-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"name":"kernel-debugsource-4.19.90-2601.5.0.0360.oe2003sp4.aarch64 as a component of openEuler-20.03-LTS-SP4"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-20.03-LTS-SP4",
				"product_reference":"kernel-devel-4.19.90-2601.5.0.0360.oe2003sp4.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-20.03-LTS-SP4:kernel-devel-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"name":"kernel-devel-4.19.90-2601.5.0.0360.oe2003sp4.aarch64 as a component of openEuler-20.03-LTS-SP4"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-20.03-LTS-SP4",
				"product_reference":"kernel-source-4.19.90-2601.5.0.0360.oe2003sp4.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-20.03-LTS-SP4:kernel-source-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"name":"kernel-source-4.19.90-2601.5.0.0360.oe2003sp4.aarch64 as a component of openEuler-20.03-LTS-SP4"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-20.03-LTS-SP4",
				"product_reference":"kernel-tools-4.19.90-2601.5.0.0360.oe2003sp4.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-20.03-LTS-SP4:kernel-tools-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"name":"kernel-tools-4.19.90-2601.5.0.0360.oe2003sp4.aarch64 as a component of openEuler-20.03-LTS-SP4"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-20.03-LTS-SP4",
				"product_reference":"kernel-tools-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-20.03-LTS-SP4:kernel-tools-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"name":"kernel-tools-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64 as a component of openEuler-20.03-LTS-SP4"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-20.03-LTS-SP4",
				"product_reference":"kernel-tools-devel-4.19.90-2601.5.0.0360.oe2003sp4.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-20.03-LTS-SP4:kernel-tools-devel-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"name":"kernel-tools-devel-4.19.90-2601.5.0.0360.oe2003sp4.aarch64 as a component of openEuler-20.03-LTS-SP4"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-20.03-LTS-SP4",
				"product_reference":"perf-4.19.90-2601.5.0.0360.oe2003sp4.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-20.03-LTS-SP4:perf-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"name":"perf-4.19.90-2601.5.0.0360.oe2003sp4.aarch64 as a component of openEuler-20.03-LTS-SP4"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-20.03-LTS-SP4",
				"product_reference":"perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-20.03-LTS-SP4:perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"name":"perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64 as a component of openEuler-20.03-LTS-SP4"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-20.03-LTS-SP4",
				"product_reference":"python2-perf-4.19.90-2601.5.0.0360.oe2003sp4.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-20.03-LTS-SP4:python2-perf-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"name":"python2-perf-4.19.90-2601.5.0.0360.oe2003sp4.aarch64 as a component of openEuler-20.03-LTS-SP4"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-20.03-LTS-SP4",
				"product_reference":"python2-perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-20.03-LTS-SP4:python2-perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"name":"python2-perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64 as a component of openEuler-20.03-LTS-SP4"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-20.03-LTS-SP4",
				"product_reference":"python3-perf-4.19.90-2601.5.0.0360.oe2003sp4.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-20.03-LTS-SP4:python3-perf-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"name":"python3-perf-4.19.90-2601.5.0.0360.oe2003sp4.aarch64 as a component of openEuler-20.03-LTS-SP4"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-20.03-LTS-SP4",
				"product_reference":"python3-perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-20.03-LTS-SP4:python3-perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"name":"python3-perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64 as a component of openEuler-20.03-LTS-SP4"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-20.03-LTS-SP4",
				"product_reference":"bpftool-4.19.90-2601.5.0.0360.oe2003sp4.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-20.03-LTS-SP4:bpftool-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"name":"bpftool-4.19.90-2601.5.0.0360.oe2003sp4.x86_64 as a component of openEuler-20.03-LTS-SP4"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-20.03-LTS-SP4",
				"product_reference":"bpftool-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-20.03-LTS-SP4:bpftool-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"name":"bpftool-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64 as a component of openEuler-20.03-LTS-SP4"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-20.03-LTS-SP4",
				"product_reference":"kernel-4.19.90-2601.5.0.0360.oe2003sp4.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-20.03-LTS-SP4:kernel-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"name":"kernel-4.19.90-2601.5.0.0360.oe2003sp4.x86_64 as a component of openEuler-20.03-LTS-SP4"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-20.03-LTS-SP4",
				"product_reference":"kernel-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-20.03-LTS-SP4:kernel-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"name":"kernel-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64 as a component of openEuler-20.03-LTS-SP4"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-20.03-LTS-SP4",
				"product_reference":"kernel-debugsource-4.19.90-2601.5.0.0360.oe2003sp4.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-20.03-LTS-SP4:kernel-debugsource-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"name":"kernel-debugsource-4.19.90-2601.5.0.0360.oe2003sp4.x86_64 as a component of openEuler-20.03-LTS-SP4"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-20.03-LTS-SP4",
				"product_reference":"kernel-devel-4.19.90-2601.5.0.0360.oe2003sp4.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-20.03-LTS-SP4:kernel-devel-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"name":"kernel-devel-4.19.90-2601.5.0.0360.oe2003sp4.x86_64 as a component of openEuler-20.03-LTS-SP4"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-20.03-LTS-SP4",
				"product_reference":"kernel-source-4.19.90-2601.5.0.0360.oe2003sp4.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-20.03-LTS-SP4:kernel-source-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"name":"kernel-source-4.19.90-2601.5.0.0360.oe2003sp4.x86_64 as a component of openEuler-20.03-LTS-SP4"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-20.03-LTS-SP4",
				"product_reference":"kernel-tools-4.19.90-2601.5.0.0360.oe2003sp4.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-20.03-LTS-SP4:kernel-tools-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"name":"kernel-tools-4.19.90-2601.5.0.0360.oe2003sp4.x86_64 as a component of openEuler-20.03-LTS-SP4"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-20.03-LTS-SP4",
				"product_reference":"kernel-tools-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-20.03-LTS-SP4:kernel-tools-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"name":"kernel-tools-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64 as a component of openEuler-20.03-LTS-SP4"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-20.03-LTS-SP4",
				"product_reference":"kernel-tools-devel-4.19.90-2601.5.0.0360.oe2003sp4.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-20.03-LTS-SP4:kernel-tools-devel-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"name":"kernel-tools-devel-4.19.90-2601.5.0.0360.oe2003sp4.x86_64 as a component of openEuler-20.03-LTS-SP4"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-20.03-LTS-SP4",
				"product_reference":"perf-4.19.90-2601.5.0.0360.oe2003sp4.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-20.03-LTS-SP4:perf-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"name":"perf-4.19.90-2601.5.0.0360.oe2003sp4.x86_64 as a component of openEuler-20.03-LTS-SP4"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-20.03-LTS-SP4",
				"product_reference":"perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-20.03-LTS-SP4:perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"name":"perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64 as a component of openEuler-20.03-LTS-SP4"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-20.03-LTS-SP4",
				"product_reference":"python2-perf-4.19.90-2601.5.0.0360.oe2003sp4.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-20.03-LTS-SP4:python2-perf-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"name":"python2-perf-4.19.90-2601.5.0.0360.oe2003sp4.x86_64 as a component of openEuler-20.03-LTS-SP4"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-20.03-LTS-SP4",
				"product_reference":"python2-perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-20.03-LTS-SP4:python2-perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"name":"python2-perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64 as a component of openEuler-20.03-LTS-SP4"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-20.03-LTS-SP4",
				"product_reference":"python3-perf-4.19.90-2601.5.0.0360.oe2003sp4.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-20.03-LTS-SP4:python3-perf-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"name":"python3-perf-4.19.90-2601.5.0.0360.oe2003sp4.x86_64 as a component of openEuler-20.03-LTS-SP4"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-20.03-LTS-SP4",
				"product_reference":"python3-perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-20.03-LTS-SP4:python3-perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"name":"python3-perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64 as a component of openEuler-20.03-LTS-SP4"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-20.03-LTS-SP4",
				"product_reference":"kernel-4.19.90-2601.5.0.0360.oe2003sp4.src.rpm",
				"full_product_name":{
					"product_id":"openEuler-20.03-LTS-SP4:kernel-4.19.90-2601.5.0.0360.oe2003sp4.src",
					"name":"kernel-4.19.90-2601.5.0.0360.oe2003sp4.src as a component of openEuler-20.03-LTS-SP4"
				},
				"category":"default_component_of"
			}
		]
	},
	"vulnerabilities":[
		{
			"cve":"CVE-2022-50816",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nipv6: ensure sane device mtu in tunnels\n\nAnother syzbot report [1] with no reproducer hints\nat a bug in ip6_gre tunnel (dev:ip6gretap0)\n\nSince ipv6 mcast code makes sure to read dev->mtu once\nand applies a sanity check on it (see commit b9b312a7a451\n\"ipv6: mcast: better catch silly mtu values\"), a remaining\npossibility is that a layer is able to set dev->mtu to\nan underflowed value (high order bit set).\n\nThis could happen indeed in ip6gre_tnl_link_config_route(),\nip6_tnl_link_config() and ipip6_tunnel_bind_dev()\n\nMake sure to sanitize mtu value in a local variable before\nit is written once on dev->mtu, as lockless readers could\ncatch wrong temporary value.\n\n[1]\nskbuff: skb_over_panic: text:ffff80000b7a2f38 len:40 put:40 head:ffff000149dcf200 data:ffff000149dcf2b0 tail:0xd8 end:0xc0 dev:ip6gretap0\n------------[ cut here ]------------\nkernel BUG at net/core/skbuff.c:120\nInternal error: Oops - BUG: 00000000f2000800 [#1] PREEMPT SMP\nModules linked in:\nCPU: 1 PID: 10241 Comm: kworker/1:1 Not tainted 6.0.0-rc7-syzkaller-18095-gbbed346d5a96 #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/30/2022\nWorkqueue: mld mld_ifc_work\npstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)\npc : skb_panic+0x4c/0x50 net/core/skbuff.c:116\nlr : skb_panic+0x4c/0x50 net/core/skbuff.c:116\nsp : ffff800020dd3b60\nx29: ffff800020dd3b70 x28: 0000000000000000 x27: ffff00010df2a800\nx26: 00000000000000c0 x25: 00000000000000b0 x24: ffff000149dcf200\nx23: 00000000000000c0 x22: 00000000000000d8 x21: ffff80000b7a2f38\nx20: ffff00014c2f7800 x19: 0000000000000028 x18: 00000000000001a9\nx17: 0000000000000000 x16: ffff80000db49158 x15: ffff000113bf1a80\nx14: 0000000000000000 x13: 00000000ffffffff x12: ffff000113bf1a80\nx11: ff808000081c0d5c x10: 0000000000000000 x9 : 73f125dc5c63ba00\nx8 : 73f125dc5c63ba00 x7 : ffff800008161d1c x6 : 0000000000000000\nx5 : 0000000000000080 x4 : 0000000000000001 x3 : 0000000000000000\nx2 : ffff0001fefddcd0 x1 : 0000000100000000 x0 : 0000000000000089\nCall trace:\nskb_panic+0x4c/0x50 net/core/skbuff.c:116\nskb_over_panic net/core/skbuff.c:125 [inline]\nskb_put+0xd4/0xdc net/core/skbuff.c:2049\nip6_mc_hdr net/ipv6/mcast.c:1714 [inline]\nmld_newpack+0x14c/0x270 net/ipv6/mcast.c:1765\nadd_grhead net/ipv6/mcast.c:1851 [inline]\nadd_grec+0xa20/0xae0 net/ipv6/mcast.c:1989\nmld_send_cr+0x438/0x5a8 net/ipv6/mcast.c:2115\nmld_ifc_work+0x38/0x290 net/ipv6/mcast.c:2653\nprocess_one_work+0x2d8/0x504 kernel/workqueue.c:2289\nworker_thread+0x340/0x610 kernel/workqueue.c:2436\nkthread+0x12c/0x158 kernel/kthread.c:376\nret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:860\nCode: 91011400 aa0803e1 a90027ea 94373093 (d4210000)",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-20.03-LTS-SP4:bpftool-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:bpftool-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-debugsource-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-devel-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-source-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-tools-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-tools-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-tools-devel-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:perf-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:python2-perf-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:python2-perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:python3-perf-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:python3-perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:bpftool-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:bpftool-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-debugsource-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-devel-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-source-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-tools-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-tools-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-tools-devel-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:perf-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:python2-perf-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:python2-perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:python3-perf-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:python3-perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-4.19.90-2601.5.0.0360.oe2003sp4.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-20.03-LTS-SP4:bpftool-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:bpftool-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-debugsource-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-devel-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-source-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-tools-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-tools-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-tools-devel-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:perf-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python2-perf-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python2-perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python3-perf-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python3-perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:bpftool-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:bpftool-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-debugsource-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-devel-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-source-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-tools-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-tools-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-tools-devel-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:perf-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python2-perf-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python2-perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python3-perf-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python3-perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-4.19.90-2601.5.0.0360.oe2003sp4.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-1276"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":4.7,
						"vectorString":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-20.03-LTS-SP4:bpftool-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:bpftool-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-debugsource-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-devel-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-source-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-tools-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-tools-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-tools-devel-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:perf-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python2-perf-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python2-perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python3-perf-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python3-perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:bpftool-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:bpftool-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-debugsource-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-devel-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-source-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-tools-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-tools-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-tools-devel-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:perf-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python2-perf-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python2-perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python3-perf-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python3-perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-4.19.90-2601.5.0.0360.oe2003sp4.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2022-50816"
		},
		{
			"cve":"CVE-2022-50824",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\ntpm: tpm_tis: Add the missed acpi_put_table() to fix memory leak\n\nIn check_acpi_tpm2(), we get the TPM2 table just to make\nsure the table is there, not used after the init, so the\nacpi_put_table() should be added to release the ACPI memory.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-20.03-LTS-SP4:bpftool-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:bpftool-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-debugsource-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-devel-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-source-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-tools-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-tools-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-tools-devel-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:perf-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:python2-perf-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:python2-perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:python3-perf-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:python3-perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:bpftool-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:bpftool-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-debugsource-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-devel-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-source-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-tools-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-tools-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-tools-devel-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:perf-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:python2-perf-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:python2-perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:python3-perf-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:python3-perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-4.19.90-2601.5.0.0360.oe2003sp4.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-20.03-LTS-SP4:bpftool-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:bpftool-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-debugsource-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-devel-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-source-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-tools-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-tools-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-tools-devel-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:perf-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python2-perf-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python2-perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python3-perf-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python3-perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:bpftool-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:bpftool-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-debugsource-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-devel-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-source-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-tools-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-tools-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-tools-devel-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:perf-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python2-perf-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python2-perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python3-perf-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python3-perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-4.19.90-2601.5.0.0360.oe2003sp4.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-1276"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-20.03-LTS-SP4:bpftool-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:bpftool-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-debugsource-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-devel-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-source-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-tools-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-tools-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-tools-devel-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:perf-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python2-perf-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python2-perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python3-perf-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python3-perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:bpftool-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:bpftool-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-debugsource-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-devel-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-source-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-tools-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-tools-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-tools-devel-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:perf-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python2-perf-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python2-perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python3-perf-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python3-perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-4.19.90-2601.5.0.0360.oe2003sp4.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2022-50824"
		},
		{
			"cve":"CVE-2022-50846",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nmmc: via-sdmmc: fix return value check of mmc_add_host()\n\nmmc_add_host() may return error, if we ignore its return value,\nit will lead two issues:\n1. The memory that allocated in mmc_alloc_host() is leaked.\n2. In the remove() path, mmc_remove_host() will be called to\n   delete device, but it's not added yet, it will lead a kernel\n   crash because of null-ptr-deref in device_del().\n\nFix this by checking the return value and goto error path which\nwill call mmc_free_host().",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-20.03-LTS-SP4:bpftool-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:bpftool-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-debugsource-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-devel-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-source-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-tools-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-tools-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-tools-devel-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:perf-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:python2-perf-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:python2-perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:python3-perf-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:python3-perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:bpftool-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:bpftool-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-debugsource-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-devel-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-source-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-tools-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-tools-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-tools-devel-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:perf-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:python2-perf-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:python2-perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:python3-perf-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:python3-perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-4.19.90-2601.5.0.0360.oe2003sp4.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-20.03-LTS-SP4:bpftool-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:bpftool-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-debugsource-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-devel-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-source-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-tools-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-tools-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-tools-devel-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:perf-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python2-perf-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python2-perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python3-perf-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python3-perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:bpftool-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:bpftool-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-debugsource-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-devel-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-source-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-tools-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-tools-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-tools-devel-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:perf-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python2-perf-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python2-perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python3-perf-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python3-perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-4.19.90-2601.5.0.0360.oe2003sp4.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-1276"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-20.03-LTS-SP4:bpftool-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:bpftool-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-debugsource-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-devel-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-source-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-tools-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-tools-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-tools-devel-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:perf-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python2-perf-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python2-perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python3-perf-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python3-perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:bpftool-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:bpftool-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-debugsource-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-devel-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-source-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-tools-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-tools-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-tools-devel-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:perf-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python2-perf-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python2-perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python3-perf-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python3-perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-4.19.90-2601.5.0.0360.oe2003sp4.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2022-50846"
		},
		{
			"cve":"CVE-2022-50850",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: ipr: Fix WARNING in ipr_init()\n\nipr_init() will not call unregister_reboot_notifier() when\npci_register_driver() fails, which causes a WARNING. Call\nunregister_reboot_notifier() when pci_register_driver() fails.\n\nnotifier callback ipr_halt [ipr] already registered\nWARNING: CPU: 3 PID: 299 at kernel/notifier.c:29\nnotifier_chain_register+0x16d/0x230\nModules linked in: ipr(+) xhci_pci_renesas xhci_hcd ehci_hcd usbcore\nled_class gpu_sched drm_buddy video wmi drm_ttm_helper ttm\ndrm_display_helper drm_kms_helper drm drm_panel_orientation_quirks\nagpgart cfbft\nCPU: 3 PID: 299 Comm: modprobe Tainted: G        W\n6.1.0-rc1-00190-g39508d23b672-dirty #332\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS\nrel-1.15.0-0-g2dd4b9b3f840-prebuilt.qemu.org 04/01/2014\nRIP: 0010:notifier_chain_register+0x16d/0x230\nCall Trace:\n <TASK>\n __blocking_notifier_chain_register+0x73/0xb0\n ipr_init+0x30/0x1000 [ipr]\n do_one_initcall+0xdb/0x480\n do_init_module+0x1cf/0x680\n load_module+0x6a50/0x70a0\n __do_sys_finit_module+0x12f/0x1c0\n do_syscall_64+0x3f/0x90\n entry_SYSCALL_64_after_hwframe+0x63/0xcd",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-20.03-LTS-SP4:bpftool-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:bpftool-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-debugsource-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-devel-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-source-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-tools-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-tools-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-tools-devel-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:perf-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:python2-perf-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:python2-perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:python3-perf-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:python3-perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:bpftool-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:bpftool-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-debugsource-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-devel-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-source-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-tools-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-tools-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-tools-devel-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:perf-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:python2-perf-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:python2-perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:python3-perf-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:python3-perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-4.19.90-2601.5.0.0360.oe2003sp4.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-20.03-LTS-SP4:bpftool-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:bpftool-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-debugsource-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-devel-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-source-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-tools-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-tools-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-tools-devel-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:perf-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python2-perf-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python2-perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python3-perf-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python3-perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:bpftool-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:bpftool-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-debugsource-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-devel-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-source-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-tools-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-tools-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-tools-devel-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:perf-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python2-perf-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python2-perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python3-perf-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python3-perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-4.19.90-2601.5.0.0360.oe2003sp4.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-1276"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-20.03-LTS-SP4:bpftool-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:bpftool-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-debugsource-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-devel-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-source-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-tools-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-tools-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-tools-devel-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:perf-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python2-perf-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python2-perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python3-perf-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python3-perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:bpftool-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:bpftool-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-debugsource-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-devel-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-source-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-tools-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-tools-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-tools-devel-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:perf-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python2-perf-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python2-perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python3-perf-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python3-perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-4.19.90-2601.5.0.0360.oe2003sp4.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2022-50850"
		},
		{
			"cve":"CVE-2022-50885",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/rxe: Fix NULL-ptr-deref in rxe_qp_do_cleanup() when socket create failed\n\nThere is a null-ptr-deref when mount.cifs over rdma:\n\n  BUG: KASAN: null-ptr-deref in rxe_qp_do_cleanup+0x2f3/0x360 [rdma_rxe]\n  Read of size 8 at addr 0000000000000018 by task mount.cifs/3046\n\n  CPU: 2 PID: 3046 Comm: mount.cifs Not tainted 6.1.0-rc5+ #62\n  Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.14.0-1.fc3\n  Call Trace:\n   <TASK>\n   dump_stack_lvl+0x34/0x44\n   kasan_report+0xad/0x130\n   rxe_qp_do_cleanup+0x2f3/0x360 [rdma_rxe]\n   execute_in_process_context+0x25/0x90\n   __rxe_cleanup+0x101/0x1d0 [rdma_rxe]\n   rxe_create_qp+0x16a/0x180 [rdma_rxe]\n   create_qp.part.0+0x27d/0x340\n   ib_create_qp_kernel+0x73/0x160\n   rdma_create_qp+0x100/0x230\n   _smbd_get_connection+0x752/0x20f0\n   smbd_get_connection+0x21/0x40\n   cifs_get_tcp_session+0x8ef/0xda0\n   mount_get_conns+0x60/0x750\n   cifs_mount+0x103/0xd00\n   cifs_smb3_do_mount+0x1dd/0xcb0\n   smb3_get_tree+0x1d5/0x300\n   vfs_get_tree+0x41/0xf0\n   path_mount+0x9b3/0xdd0\n   __x64_sys_mount+0x190/0x1d0\n   do_syscall_64+0x35/0x80\n   entry_SYSCALL_64_after_hwframe+0x46/0xb0\n\nThe root cause of the issue is the socket create failed in\nrxe_qp_init_req().\n\nSo move the reset rxe_qp_do_cleanup() after the NULL ptr check.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-20.03-LTS-SP4:bpftool-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:bpftool-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-debugsource-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-devel-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-source-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-tools-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-tools-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-tools-devel-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:perf-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:python2-perf-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:python2-perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:python3-perf-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:python3-perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:bpftool-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:bpftool-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-debugsource-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-devel-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-source-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-tools-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-tools-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-tools-devel-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:perf-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:python2-perf-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:python2-perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:python3-perf-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:python3-perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-4.19.90-2601.5.0.0360.oe2003sp4.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-20.03-LTS-SP4:bpftool-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:bpftool-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-debugsource-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-devel-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-source-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-tools-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-tools-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-tools-devel-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:perf-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python2-perf-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python2-perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python3-perf-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python3-perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:bpftool-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:bpftool-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-debugsource-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-devel-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-source-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-tools-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-tools-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-tools-devel-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:perf-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python2-perf-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python2-perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python3-perf-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python3-perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-4.19.90-2601.5.0.0360.oe2003sp4.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-1276"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-20.03-LTS-SP4:bpftool-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:bpftool-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-debugsource-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-devel-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-source-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-tools-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-tools-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-tools-devel-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:perf-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python2-perf-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python2-perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python3-perf-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python3-perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:bpftool-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:bpftool-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-debugsource-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-devel-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-source-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-tools-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-tools-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-tools-devel-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:perf-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python2-perf-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python2-perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python3-perf-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python3-perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-4.19.90-2601.5.0.0360.oe2003sp4.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2022-50885"
		},
		{
			"cve":"CVE-2023-54087",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nubi: Fix possible null-ptr-deref in ubi_free_volume()\n\nIt willl cause null-ptr-deref in the following case:\n\nuif_init()\n  ubi_add_volume()\n    cdev_add() -> if it fails, call kill_volumes()\n    device_register()\n\nkill_volumes() -> if ubi_add_volume() fails call this function\n  ubi_free_volume()\n    cdev_del()\n    device_unregister() -> trying to delete a not added device,\n\t\t\t   it causes null-ptr-deref\n\nSo in ubi_free_volume(), it delete devices whether they are added\nor not, it will causes null-ptr-deref.\n\nHandle the error case whlie calling ubi_add_volume() to fix this\nproblem. If add volume fails, set the corresponding vol to null,\nso it can not be accessed in kill_volumes() and release the\nresource in ubi_add_volume() error path.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-20.03-LTS-SP4:bpftool-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:bpftool-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-debugsource-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-devel-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-source-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-tools-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-tools-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-tools-devel-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:perf-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:python2-perf-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:python2-perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:python3-perf-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:python3-perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:bpftool-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:bpftool-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-debugsource-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-devel-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-source-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-tools-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-tools-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-tools-devel-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:perf-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:python2-perf-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:python2-perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:python3-perf-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:python3-perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-4.19.90-2601.5.0.0360.oe2003sp4.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-20.03-LTS-SP4:bpftool-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:bpftool-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-debugsource-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-devel-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-source-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-tools-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-tools-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-tools-devel-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:perf-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python2-perf-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python2-perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python3-perf-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python3-perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:bpftool-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:bpftool-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-debugsource-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-devel-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-source-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-tools-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-tools-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-tools-devel-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:perf-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python2-perf-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python2-perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python3-perf-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python3-perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-4.19.90-2601.5.0.0360.oe2003sp4.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-1276"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-20.03-LTS-SP4:bpftool-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:bpftool-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-debugsource-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-devel-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-source-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-tools-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-tools-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-tools-devel-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:perf-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python2-perf-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python2-perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python3-perf-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python3-perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:bpftool-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:bpftool-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-debugsource-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-devel-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-source-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-tools-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-tools-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-tools-devel-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:perf-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python2-perf-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python2-perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python3-perf-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python3-perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-4.19.90-2601.5.0.0360.oe2003sp4.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2023-54087"
		},
		{
			"cve":"CVE-2023-54110",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nusb: rndis_host: Secure rndis_query check against int overflow\n\nVariables off and len typed as uint32 in rndis_query function\nare controlled by incoming RNDIS response message thus their\nvalue may be manipulated. Setting off to a unexpectetly large\nvalue will cause the sum with len and 8 to overflow and pass\nthe implemented validation step. Consequently the response\npointer will be referring to a location past the expected\nbuffer boundaries allowing information leakage e.g. via\nRNDIS_OID_802_3_PERMANENT_ADDRESS OID.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-20.03-LTS-SP4:bpftool-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:bpftool-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-debugsource-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-devel-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-source-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-tools-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-tools-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-tools-devel-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:perf-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:python2-perf-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:python2-perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:python3-perf-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:python3-perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:bpftool-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:bpftool-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-debugsource-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-devel-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-source-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-tools-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-tools-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-tools-devel-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:perf-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:python2-perf-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:python2-perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:python3-perf-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:python3-perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-4.19.90-2601.5.0.0360.oe2003sp4.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-20.03-LTS-SP4:bpftool-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:bpftool-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-debugsource-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-devel-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-source-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-tools-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-tools-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-tools-devel-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:perf-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python2-perf-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python2-perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python3-perf-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python3-perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:bpftool-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:bpftool-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-debugsource-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-devel-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-source-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-tools-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-tools-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-tools-devel-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:perf-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python2-perf-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python2-perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python3-perf-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python3-perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-4.19.90-2601.5.0.0360.oe2003sp4.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-1276"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":6.7,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-20.03-LTS-SP4:bpftool-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:bpftool-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-debugsource-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-devel-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-source-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-tools-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-tools-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-tools-devel-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:perf-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python2-perf-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python2-perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python3-perf-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python3-perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:bpftool-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:bpftool-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-debugsource-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-devel-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-source-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-tools-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-tools-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-tools-devel-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:perf-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python2-perf-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python2-perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python3-perf-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python3-perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-4.19.90-2601.5.0.0360.oe2003sp4.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2023-54110"
		},
		{
			"cve":"CVE-2023-54179",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: qla2xxx: Array index may go out of bound\n\nKlocwork reports array 'vha->host_str' of size 16 may use index value(s)\n16..19.  Use snprintf() instead of sprintf().",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-20.03-LTS-SP4:bpftool-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:bpftool-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-debugsource-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-devel-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-source-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-tools-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-tools-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-tools-devel-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:perf-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:python2-perf-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:python2-perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:python3-perf-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:python3-perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:bpftool-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:bpftool-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-debugsource-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-devel-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-source-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-tools-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-tools-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-tools-devel-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:perf-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:python2-perf-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:python2-perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:python3-perf-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:python3-perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-4.19.90-2601.5.0.0360.oe2003sp4.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-20.03-LTS-SP4:bpftool-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:bpftool-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-debugsource-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-devel-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-source-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-tools-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-tools-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-tools-devel-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:perf-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python2-perf-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python2-perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python3-perf-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python3-perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:bpftool-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:bpftool-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-debugsource-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-devel-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-source-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-tools-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-tools-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-tools-devel-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:perf-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python2-perf-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python2-perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python3-perf-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python3-perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-4.19.90-2601.5.0.0360.oe2003sp4.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-1276"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":6.6,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-20.03-LTS-SP4:bpftool-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:bpftool-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-debugsource-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-devel-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-source-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-tools-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-tools-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-tools-devel-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:perf-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python2-perf-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python2-perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python3-perf-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python3-perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:bpftool-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:bpftool-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-debugsource-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-devel-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-source-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-tools-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-tools-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-tools-devel-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:perf-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python2-perf-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python2-perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python3-perf-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python3-perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-4.19.90-2601.5.0.0360.oe2003sp4.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2023-54179"
		},
		{
			"cve":"CVE-2023-54218",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nnet: Fix load-tearing on sk->sk_stamp in sock_recv_cmsgs().\n\nKCSAN found a data race in sock_recv_cmsgs() where the read access\nto sk->sk_stamp needs READ_ONCE().\n\nBUG: KCSAN: data-race in packet_recvmsg / packet_recvmsg\n\nwrite (marked) to 0xffff88803c81f258 of 8 bytes by task 19171 on cpu 0:\n sock_write_timestamp include/net/sock.h:2670 [inline]\n sock_recv_cmsgs include/net/sock.h:2722 [inline]\n packet_recvmsg+0xb97/0xd00 net/packet/af_packet.c:3489\n sock_recvmsg_nosec net/socket.c:1019 [inline]\n sock_recvmsg+0x11a/0x130 net/socket.c:1040\n sock_read_iter+0x176/0x220 net/socket.c:1118\n call_read_iter include/linux/fs.h:1845 [inline]\n new_sync_read fs/read_write.c:389 [inline]\n vfs_read+0x5e0/0x630 fs/read_write.c:470\n ksys_read+0x163/0x1a0 fs/read_write.c:613\n __do_sys_read fs/read_write.c:623 [inline]\n __se_sys_read fs/read_write.c:621 [inline]\n __x64_sys_read+0x41/0x50 fs/read_write.c:621\n do_syscall_x64 arch/x86/entry/common.c:50 [inline]\n do_syscall_64+0x3b/0x90 arch/x86/entry/common.c:80\n entry_SYSCALL_64_after_hwframe+0x72/0xdc\n\nread to 0xffff88803c81f258 of 8 bytes by task 19183 on cpu 1:\n sock_recv_cmsgs include/net/sock.h:2721 [inline]\n packet_recvmsg+0xb64/0xd00 net/packet/af_packet.c:3489\n sock_recvmsg_nosec net/socket.c:1019 [inline]\n sock_recvmsg+0x11a/0x130 net/socket.c:1040\n sock_read_iter+0x176/0x220 net/socket.c:1118\n call_read_iter include/linux/fs.h:1845 [inline]\n new_sync_read fs/read_write.c:389 [inline]\n vfs_read+0x5e0/0x630 fs/read_write.c:470\n ksys_read+0x163/0x1a0 fs/read_write.c:613\n __do_sys_read fs/read_write.c:623 [inline]\n __se_sys_read fs/read_write.c:621 [inline]\n __x64_sys_read+0x41/0x50 fs/read_write.c:621\n do_syscall_x64 arch/x86/entry/common.c:50 [inline]\n do_syscall_64+0x3b/0x90 arch/x86/entry/common.c:80\n entry_SYSCALL_64_after_hwframe+0x72/0xdc\n\nvalue changed: 0xffffffffc4653600 -> 0x0000000000000000\n\nReported by Kernel Concurrency Sanitizer on:\nCPU: 1 PID: 19183 Comm: syz-executor.5 Not tainted 6.3.0-rc7-02330-gca6270c12e20 #2\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.0-0-gd239552ce722-prebuilt.qemu.org 04/01/2014",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-20.03-LTS-SP4:bpftool-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:bpftool-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-debugsource-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-devel-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-source-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-tools-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-tools-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-tools-devel-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:perf-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:python2-perf-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:python2-perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:python3-perf-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:python3-perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:bpftool-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:bpftool-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-debugsource-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-devel-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-source-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-tools-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-tools-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-tools-devel-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:perf-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:python2-perf-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:python2-perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:python3-perf-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:python3-perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-4.19.90-2601.5.0.0360.oe2003sp4.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-20.03-LTS-SP4:bpftool-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:bpftool-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-debugsource-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-devel-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-source-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-tools-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-tools-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-tools-devel-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:perf-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python2-perf-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python2-perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python3-perf-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python3-perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:bpftool-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:bpftool-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-debugsource-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-devel-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-source-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-tools-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-tools-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-tools-devel-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:perf-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python2-perf-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python2-perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python3-perf-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python3-perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-4.19.90-2601.5.0.0360.oe2003sp4.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-1276"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-20.03-LTS-SP4:bpftool-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:bpftool-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-debugsource-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-devel-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-source-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-tools-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-tools-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-tools-devel-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:perf-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python2-perf-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python2-perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python3-perf-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python3-perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:bpftool-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:bpftool-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-debugsource-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-devel-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-source-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-tools-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-tools-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-tools-devel-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:perf-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python2-perf-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python2-perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python3-perf-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python3-perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-4.19.90-2601.5.0.0360.oe2003sp4.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2023-54218"
		},
		{
			"cve":"CVE-2023-54283",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Address KCSAN report on bpf_lru_list\n\nKCSAN reported a data-race when accessing node->ref.\nAlthough node->ref does not have to be accurate,\ntake this chance to use a more common READ_ONCE() and WRITE_ONCE()\npattern instead of data_race().\n\nThere is an existing bpf_lru_node_is_ref() and bpf_lru_node_set_ref().\nThis patch also adds bpf_lru_node_clear_ref() to do the\nWRITE_ONCE(node->ref, 0) also.\n\n==================================================================\nBUG: KCSAN: data-race in __bpf_lru_list_rotate / __htab_lru_percpu_map_update_elem\n\nwrite to 0xffff888137038deb of 1 bytes by task 11240 on cpu 1:\n__bpf_lru_node_move kernel/bpf/bpf_lru_list.c:113 [inline]\n__bpf_lru_list_rotate_active kernel/bpf/bpf_lru_list.c:149 [inline]\n__bpf_lru_list_rotate+0x1bf/0x750 kernel/bpf/bpf_lru_list.c:240\nbpf_lru_list_pop_free_to_local kernel/bpf/bpf_lru_list.c:329 [inline]\nbpf_common_lru_pop_free kernel/bpf/bpf_lru_list.c:447 [inline]\nbpf_lru_pop_free+0x638/0xe20 kernel/bpf/bpf_lru_list.c:499\nprealloc_lru_pop kernel/bpf/hashtab.c:290 [inline]\n__htab_lru_percpu_map_update_elem+0xe7/0x820 kernel/bpf/hashtab.c:1316\nbpf_percpu_hash_update+0x5e/0x90 kernel/bpf/hashtab.c:2313\nbpf_map_update_value+0x2a9/0x370 kernel/bpf/syscall.c:200\ngeneric_map_update_batch+0x3ae/0x4f0 kernel/bpf/syscall.c:1687\nbpf_map_do_batch+0x2d9/0x3d0 kernel/bpf/syscall.c:4534\n__sys_bpf+0x338/0x810\n__do_sys_bpf kernel/bpf/syscall.c:5096 [inline]\n__se_sys_bpf kernel/bpf/syscall.c:5094 [inline]\n__x64_sys_bpf+0x43/0x50 kernel/bpf/syscall.c:5094\ndo_syscall_x64 arch/x86/entry/common.c:50 [inline]\ndo_syscall_64+0x41/0xc0 arch/x86/entry/common.c:80\nentry_SYSCALL_64_after_hwframe+0x63/0xcd\n\nread to 0xffff888137038deb of 1 bytes by task 11241 on cpu 0:\nbpf_lru_node_set_ref kernel/bpf/bpf_lru_list.h:70 [inline]\n__htab_lru_percpu_map_update_elem+0x2f1/0x820 kernel/bpf/hashtab.c:1332\nbpf_percpu_hash_update+0x5e/0x90 kernel/bpf/hashtab.c:2313\nbpf_map_update_value+0x2a9/0x370 kernel/bpf/syscall.c:200\ngeneric_map_update_batch+0x3ae/0x4f0 kernel/bpf/syscall.c:1687\nbpf_map_do_batch+0x2d9/0x3d0 kernel/bpf/syscall.c:4534\n__sys_bpf+0x338/0x810\n__do_sys_bpf kernel/bpf/syscall.c:5096 [inline]\n__se_sys_bpf kernel/bpf/syscall.c:5094 [inline]\n__x64_sys_bpf+0x43/0x50 kernel/bpf/syscall.c:5094\ndo_syscall_x64 arch/x86/entry/common.c:50 [inline]\ndo_syscall_64+0x41/0xc0 arch/x86/entry/common.c:80\nentry_SYSCALL_64_after_hwframe+0x63/0xcd\n\nvalue changed: 0x01 -> 0x00\n\nReported by Kernel Concurrency Sanitizer on:\nCPU: 0 PID: 11241 Comm: syz-executor.3 Not tainted 6.3.0-rc7-syzkaller-00136-g6a66fdd29ea1 #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/30/2023\n==================================================================",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-20.03-LTS-SP4:bpftool-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:bpftool-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-debugsource-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-devel-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-source-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-tools-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-tools-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-tools-devel-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:perf-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:python2-perf-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:python2-perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:python3-perf-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:python3-perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:bpftool-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:bpftool-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-debugsource-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-devel-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-source-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-tools-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-tools-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-tools-devel-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:perf-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:python2-perf-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:python2-perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:python3-perf-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:python3-perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-4.19.90-2601.5.0.0360.oe2003sp4.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-20.03-LTS-SP4:bpftool-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:bpftool-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-debugsource-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-devel-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-source-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-tools-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-tools-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-tools-devel-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:perf-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python2-perf-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python2-perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python3-perf-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python3-perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:bpftool-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:bpftool-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-debugsource-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-devel-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-source-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-tools-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-tools-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-tools-devel-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:perf-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python2-perf-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python2-perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python3-perf-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python3-perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-4.19.90-2601.5.0.0360.oe2003sp4.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-1276"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-20.03-LTS-SP4:bpftool-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:bpftool-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-debugsource-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-devel-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-source-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-tools-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-tools-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-tools-devel-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:perf-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python2-perf-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python2-perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python3-perf-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python3-perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:bpftool-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:bpftool-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-debugsource-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-devel-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-source-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-tools-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-tools-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-tools-devel-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:perf-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python2-perf-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python2-perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python3-perf-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python3-perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-4.19.90-2601.5.0.0360.oe2003sp4.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2023-54283"
		},
		{
			"cve":"CVE-2025-68241",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nipv4: route: Prevent rt_bind_exception() from rebinding stale fnhe\n\nThe sit driver's packet transmission path calls: sit_tunnel_xmit() ->\nupdate_or_create_fnhe(), which lead to fnhe_remove_oldest() being called\nto delete entries exceeding FNHE_RECLAIM_DEPTH+random.\n\nThe race window is between fnhe_remove_oldest() selecting fnheX for\ndeletion and the subsequent kfree_rcu(). During this time, the\nconcurrent path's __mkroute_output() -> find_exception() can fetch the\nsoon-to-be-deleted fnheX, and rt_bind_exception() then binds it with a\nnew dst using a dst_hold(). When the original fnheX is freed via RCU,\nthe dst reference remains permanently leaked.\n\nCPU 0                             CPU 1\n__mkroute_output()\n  find_exception() [fnheX]\n                                  update_or_create_fnhe()\n                                    fnhe_remove_oldest() [fnheX]\n  rt_bind_exception() [bind dst]\n                                  RCU callback [fnheX freed, dst leak]\n\nThis issue manifests as a device reference count leak and a warning in\ndmesg when unregistering the net device:\n\n  unregister_netdevice: waiting for sitX to become free. Usage count = N\n\nIdo Schimmel provided the simple test validation method [1].\n\nThe fix clears 'oldest->fnhe_daddr' before calling fnhe_flush_routes().\nSince rt_bind_exception() checks this field, setting it to zero prevents\nthe stale fnhe from being reused and bound to a new dst just before it\nis freed.\n\n[1]\nip netns add ns1\nip -n ns1 link set dev lo up\nip -n ns1 address add 192.0.2.1/32 dev lo\nip -n ns1 link add name dummy1 up type dummy\nip -n ns1 route add 192.0.2.2/32 dev dummy1\nip -n ns1 link add name gretap1 up arp off type gretap \\\n    local 192.0.2.1 remote 192.0.2.2\nip -n ns1 route add 198.51.0.0/16 dev gretap1\ntaskset -c 0 ip netns exec ns1 mausezahn gretap1 \\\n    -A 198.51.100.1 -B 198.51.0.0/16 -t udp -p 1000 -c 0 -q &\ntaskset -c 2 ip netns exec ns1 mausezahn gretap1 \\\n    -A 198.51.100.1 -B 198.51.0.0/16 -t udp -p 1000 -c 0 -q &\nsleep 10\nip netns pids ns1 | xargs kill\nip netns del ns1",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-20.03-LTS-SP4:bpftool-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:bpftool-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-debugsource-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-devel-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-source-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-tools-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-tools-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-tools-devel-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:perf-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:python2-perf-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:python2-perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:python3-perf-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:python3-perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:bpftool-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:bpftool-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-debugsource-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-devel-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-source-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-tools-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-tools-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-tools-devel-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:perf-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:python2-perf-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:python2-perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:python3-perf-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:python3-perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-4.19.90-2601.5.0.0360.oe2003sp4.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-20.03-LTS-SP4:bpftool-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:bpftool-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-debugsource-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-devel-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-source-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-tools-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-tools-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-tools-devel-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:perf-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python2-perf-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python2-perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python3-perf-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python3-perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:bpftool-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:bpftool-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-debugsource-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-devel-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-source-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-tools-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-tools-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-tools-devel-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:perf-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python2-perf-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python2-perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python3-perf-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python3-perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-4.19.90-2601.5.0.0360.oe2003sp4.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-1276"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":4.7,
						"vectorString":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-20.03-LTS-SP4:bpftool-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:bpftool-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-debugsource-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-devel-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-source-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-tools-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-tools-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-tools-devel-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:perf-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python2-perf-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python2-perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python3-perf-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python3-perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:bpftool-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:bpftool-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-debugsource-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-devel-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-source-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-tools-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-tools-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-tools-devel-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:perf-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python2-perf-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python2-perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python3-perf-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python3-perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-4.19.90-2601.5.0.0360.oe2003sp4.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2025-68241"
		},
		{
			"cve":"CVE-2025-71093",
			"notes":[
				{
					"text":"In the Linux kernel, a buffer overflow vulnerability exists in the e1000 network driver's e1000_tbi_should_accept() function. The function reads the last byte of the frame via 'data[length - 1]' to evaluate the TBI (Tunnel Bypass Identifier) workaround. If the descriptor-reported length is zero or larger than the actual RX buffer size, this read goes out of bounds and can hit unrelated slab objects. The issue is observed from the NAPI receive path (e1000_clean_rx_irq). The root cause is that the TBI check unconditionally dereferences the last byte without validating the reported length first. The fix rejects the frame early if the length is zero or exceeds adapter->rx_buffer_len, preserving the TBI workaround semantics for valid frames and preventing touching memory beyond the RX buffer.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-20.03-LTS-SP4:bpftool-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:bpftool-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-debugsource-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-devel-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-source-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-tools-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-tools-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:kernel-tools-devel-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:perf-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:python2-perf-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:python2-perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:python3-perf-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:python3-perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:bpftool-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:bpftool-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-debugsource-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-devel-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-source-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-tools-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-tools-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-tools-devel-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:perf-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:python2-perf-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:python2-perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:python3-perf-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:python3-perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:kernel-4.19.90-2601.5.0.0360.oe2003sp4.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-20.03-LTS-SP4:bpftool-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:bpftool-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-debugsource-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-devel-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-source-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-tools-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-tools-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-tools-devel-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:perf-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python2-perf-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python2-perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python3-perf-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python3-perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:bpftool-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:bpftool-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-debugsource-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-devel-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-source-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-tools-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-tools-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-tools-devel-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:perf-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python2-perf-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python2-perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python3-perf-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python3-perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-4.19.90-2601.5.0.0360.oe2003sp4.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-1276"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.0,
						"vectorString":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-20.03-LTS-SP4:bpftool-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:bpftool-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-debugsource-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-devel-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-source-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-tools-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-tools-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:kernel-tools-devel-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:perf-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python2-perf-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python2-perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python3-perf-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:python3-perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:bpftool-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:bpftool-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-debugsource-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-devel-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-source-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-tools-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-tools-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-tools-devel-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:perf-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python2-perf-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python2-perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python3-perf-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:python3-perf-debuginfo-4.19.90-2601.5.0.0360.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:kernel-4.19.90-2601.5.0.0360.oe2003sp4.src"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2025-71093"
		}
	]
}