{
	"document":{
		"aggregate_severity":{
			"namespace":"https://nvd.nist.gov/vuln-metrics/cvss",
			"text":"High"
		},
		"category":"csaf_vex",
		"csaf_version":"2.0",
		"distribution":{
			"tlp":{
				"label":"WHITE",
				"url":"https:/www.first.org/tlp/"
			}
		},
		"lang":"en",
		"notes":[
			{
				"text":"kernel security update",
				"category":"general",
				"title":"Synopsis"
			},
			{
				"text":"An update for kernel is now available for openEuler-22.03-LTS-SP4",
				"category":"general",
				"title":"Summary"
			},
			{
				"text":"The Linux Kernel, the operating system core itself.\n\nSecurity Fix(es):\n\nA vulnerability exists in the RDMA/umad component of the Linux kernel when processing user-space data. The ib_umad_write function calculates data_len based on user-controlled count and MAD header sizes. When a mismatched user MAD header size and RMPP header length are provided, data_len can become negative and be passed to the ib_create_send_mad() function. This can cause subsequent padding calculations to exceed the segment size, ultimately triggering an out-of-bounds memory write (memset) in the alloc_send_rmpp_list() function. An attacker could potentially exploit this vulnerability to cause kernel memory corruption, affecting system stability and confidentiality.(CVE-2026-23243)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nx86/efi: defer freeing of boot services memory\n\nefi_free_boot_services() frees memory occupied by EFI_BOOT_SERVICES_CODE and EFI_BOOT_SERVICES_DATA using memblock_free_late().\n\nThere are two issue with that: memblock_free_late() should be used for memory allocated with memblock_alloc() while the memory reserved with memblock_reserve() should be freed with free_reserved_area().\n\nMore acutely, with CONFIG_DEFERRED_STRUCT_PAGE_INIT=y efi_free_boot_services() is called before deferred initialization of the memory map is complete.\n\nBenjamin Herrenschmidt reports that this causes a leak of ~140MB of RAM on EC2 t3a.nano instances which only have 512MB or RAM.\n\nIf the freed memory resides in the areas that memory map for them is still uninitialized, they won't be actually freed because memblock_free_late() calls memblock_free_pages() and the latter skips uninitialized pages.\n\nUsing free_reserved_area() at this point is also problematic because __free_page() accesses the buddy of the freed page and that again might end up in uninitialized part of the memory map.\n\nDelaying the entire efi_free_boot_services() could be problematic because in addition to freeing boot services memory it updates efi.memmap without any synchronization and that's undesirable late in boot when there is concurrency.\n\nMore robust approach is to only defer freeing of the EFI boot services memory.\n\nSplit efi_free_boot_services() in two. First efi_unmap_boot_services() collects ranges that should be freed into an array then efi_free_boot_services() later frees them after deferred init is complete.(CVE-2026-23352)\n\nIn the Linux kernel, a vulnerability has been resolved in Squashfs component: check metadata block offset is within range. Syzkaller reports a \"general protection fault in squashfs_copy_data\". This is ultimately caused by a corrupted index look-up table, which produces a negative metadata block offset. This is subsequently passed to squashfs_copy_data (via squashfs_read_metadata) where the negative offset causes an out of bounds access. The fix is to check that the offset is within range in squashfs_read_metadata. This will trap this and other cases.(CVE-2026-23388)",
				"category":"general",
				"title":"Description"
			},
			{
				"text":"An update for kernel is now available for openEuler-22.03-LTS-SP4/openEuler-22.03-LTS-SP3.\n\nopenEuler Security has rated this update as having a security impact of high. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.",
				"category":"general",
				"title":"Topic"
			},
			{
				"text":"High",
				"category":"general",
				"title":"Severity"
			},
			{
				"text":"kernel",
				"category":"general",
				"title":"Affected Component"
			}
		],
		"publisher":{
			"issuing_authority":"openEuler security committee",
			"name":"openEuler",
			"namespace":"https://www.openeuler.org",
			"contact_details":"openeuler-security@openeuler.org",
			"category":"vendor"
		},
		"references":[
			{
				"summary":"openEuler-SA-2026-1831",
				"category":"self",
				"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-1831"
			},
			{
				"summary":"CVE-2026-23243",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2026-23243&packageName=kernel"
			},
			{
				"summary":"CVE-2026-23352",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2026-23352&packageName=kernel"
			},
			{
				"summary":"CVE-2026-23388",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2026-23388&packageName=kernel"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-23243"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-23352"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-23388"
			},
			{
				"summary":"openEuler-SA-2026-1831 vex file",
				"category":"self",
				"url":"https://repo.openeuler.org/security/data/csaf/advisories/2026/csaf-openeuler-sa-2026-1831.json"
			}
		],
		"title":"An update for kernel is now available for openEuler-22.03-LTS-SP4",
		"tracking":{
			"initial_release_date":"2026-04-03T20:35:50+08:00",
			"revision_history":[
				{
					"date":"2026-04-03T20:35:50+08:00",
					"summary":"Initial",
					"number":"1.0.0"
				}
			],
			"generator":{
				"date":"2026-04-03T20:35:50+08:00",
				"engine":{
					"name":"openEuler CSAF Tool V1.0"
				}
			},
			"current_release_date":"2026-04-03T20:35:50+08:00",
			"id":"openEuler-SA-2026-1831",
			"version":"1.0.0",
			"status":"final"
		}
	},
	"product_tree":{
		"branches":[
			{
				"name":"openEuler",
				"category":"vendor",
				"branches":[
					{
						"name":"openEuler",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP4"
									},
									"product_id":"openEuler-22.03-LTS-SP4",
									"name":"openEuler-22.03-LTS-SP4"
								},
								"name":"openEuler-22.03-LTS-SP4",
								"category":"product_version"
							}
						],
						"category":"product_name"
					},
					{
						"name":"x86_64",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP4"
									},
									"product_id":"bpftool-5.10.0-307.0.0.210.oe2203sp4.x86_64.rpm",
									"name":"bpftool-5.10.0-307.0.0.210.oe2203sp4.x86_64.rpm"
								},
								"name":"bpftool-5.10.0-307.0.0.210.oe2203sp4.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP4"
									},
									"product_id":"bpftool-debuginfo-5.10.0-307.0.0.210.oe2203sp4.x86_64.rpm",
									"name":"bpftool-debuginfo-5.10.0-307.0.0.210.oe2203sp4.x86_64.rpm"
								},
								"name":"bpftool-debuginfo-5.10.0-307.0.0.210.oe2203sp4.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP4"
									},
									"product_id":"kernel-5.10.0-307.0.0.210.oe2203sp4.x86_64.rpm",
									"name":"kernel-5.10.0-307.0.0.210.oe2203sp4.x86_64.rpm"
								},
								"name":"kernel-5.10.0-307.0.0.210.oe2203sp4.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP4"
									},
									"product_id":"kernel-debuginfo-5.10.0-307.0.0.210.oe2203sp4.x86_64.rpm",
									"name":"kernel-debuginfo-5.10.0-307.0.0.210.oe2203sp4.x86_64.rpm"
								},
								"name":"kernel-debuginfo-5.10.0-307.0.0.210.oe2203sp4.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP4"
									},
									"product_id":"kernel-debugsource-5.10.0-307.0.0.210.oe2203sp4.x86_64.rpm",
									"name":"kernel-debugsource-5.10.0-307.0.0.210.oe2203sp4.x86_64.rpm"
								},
								"name":"kernel-debugsource-5.10.0-307.0.0.210.oe2203sp4.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP4"
									},
									"product_id":"kernel-devel-5.10.0-307.0.0.210.oe2203sp4.x86_64.rpm",
									"name":"kernel-devel-5.10.0-307.0.0.210.oe2203sp4.x86_64.rpm"
								},
								"name":"kernel-devel-5.10.0-307.0.0.210.oe2203sp4.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP4"
									},
									"product_id":"kernel-headers-5.10.0-307.0.0.210.oe2203sp4.x86_64.rpm",
									"name":"kernel-headers-5.10.0-307.0.0.210.oe2203sp4.x86_64.rpm"
								},
								"name":"kernel-headers-5.10.0-307.0.0.210.oe2203sp4.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP4"
									},
									"product_id":"kernel-source-5.10.0-307.0.0.210.oe2203sp4.x86_64.rpm",
									"name":"kernel-source-5.10.0-307.0.0.210.oe2203sp4.x86_64.rpm"
								},
								"name":"kernel-source-5.10.0-307.0.0.210.oe2203sp4.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP4"
									},
									"product_id":"kernel-tools-5.10.0-307.0.0.210.oe2203sp4.x86_64.rpm",
									"name":"kernel-tools-5.10.0-307.0.0.210.oe2203sp4.x86_64.rpm"
								},
								"name":"kernel-tools-5.10.0-307.0.0.210.oe2203sp4.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP4"
									},
									"product_id":"kernel-tools-debuginfo-5.10.0-307.0.0.210.oe2203sp4.x86_64.rpm",
									"name":"kernel-tools-debuginfo-5.10.0-307.0.0.210.oe2203sp4.x86_64.rpm"
								},
								"name":"kernel-tools-debuginfo-5.10.0-307.0.0.210.oe2203sp4.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP4"
									},
									"product_id":"kernel-tools-devel-5.10.0-307.0.0.210.oe2203sp4.x86_64.rpm",
									"name":"kernel-tools-devel-5.10.0-307.0.0.210.oe2203sp4.x86_64.rpm"
								},
								"name":"kernel-tools-devel-5.10.0-307.0.0.210.oe2203sp4.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP4"
									},
									"product_id":"perf-5.10.0-307.0.0.210.oe2203sp4.x86_64.rpm",
									"name":"perf-5.10.0-307.0.0.210.oe2203sp4.x86_64.rpm"
								},
								"name":"perf-5.10.0-307.0.0.210.oe2203sp4.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP4"
									},
									"product_id":"perf-debuginfo-5.10.0-307.0.0.210.oe2203sp4.x86_64.rpm",
									"name":"perf-debuginfo-5.10.0-307.0.0.210.oe2203sp4.x86_64.rpm"
								},
								"name":"perf-debuginfo-5.10.0-307.0.0.210.oe2203sp4.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP4"
									},
									"product_id":"python3-perf-5.10.0-307.0.0.210.oe2203sp4.x86_64.rpm",
									"name":"python3-perf-5.10.0-307.0.0.210.oe2203sp4.x86_64.rpm"
								},
								"name":"python3-perf-5.10.0-307.0.0.210.oe2203sp4.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP4"
									},
									"product_id":"python3-perf-debuginfo-5.10.0-307.0.0.210.oe2203sp4.x86_64.rpm",
									"name":"python3-perf-debuginfo-5.10.0-307.0.0.210.oe2203sp4.x86_64.rpm"
								},
								"name":"python3-perf-debuginfo-5.10.0-307.0.0.210.oe2203sp4.x86_64.rpm",
								"category":"product_version"
							}
						],
						"category":"architecture"
					},
					{
						"name":"src",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP4"
									},
									"product_id":"kernel-5.10.0-307.0.0.210.oe2203sp4.src.rpm",
									"name":"kernel-5.10.0-307.0.0.210.oe2203sp4.src.rpm"
								},
								"name":"kernel-5.10.0-307.0.0.210.oe2203sp4.src.rpm",
								"category":"product_version"
							}
						],
						"category":"architecture"
					},
					{
						"name":"aarch64",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP4"
									},
									"product_id":"bpftool-5.10.0-307.0.0.210.oe2203sp4.aarch64.rpm",
									"name":"bpftool-5.10.0-307.0.0.210.oe2203sp4.aarch64.rpm"
								},
								"name":"bpftool-5.10.0-307.0.0.210.oe2203sp4.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP4"
									},
									"product_id":"bpftool-debuginfo-5.10.0-307.0.0.210.oe2203sp4.aarch64.rpm",
									"name":"bpftool-debuginfo-5.10.0-307.0.0.210.oe2203sp4.aarch64.rpm"
								},
								"name":"bpftool-debuginfo-5.10.0-307.0.0.210.oe2203sp4.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP4"
									},
									"product_id":"kernel-5.10.0-307.0.0.210.oe2203sp4.aarch64.rpm",
									"name":"kernel-5.10.0-307.0.0.210.oe2203sp4.aarch64.rpm"
								},
								"name":"kernel-5.10.0-307.0.0.210.oe2203sp4.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP4"
									},
									"product_id":"kernel-debuginfo-5.10.0-307.0.0.210.oe2203sp4.aarch64.rpm",
									"name":"kernel-debuginfo-5.10.0-307.0.0.210.oe2203sp4.aarch64.rpm"
								},
								"name":"kernel-debuginfo-5.10.0-307.0.0.210.oe2203sp4.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP4"
									},
									"product_id":"kernel-debugsource-5.10.0-307.0.0.210.oe2203sp4.aarch64.rpm",
									"name":"kernel-debugsource-5.10.0-307.0.0.210.oe2203sp4.aarch64.rpm"
								},
								"name":"kernel-debugsource-5.10.0-307.0.0.210.oe2203sp4.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP4"
									},
									"product_id":"kernel-devel-5.10.0-307.0.0.210.oe2203sp4.aarch64.rpm",
									"name":"kernel-devel-5.10.0-307.0.0.210.oe2203sp4.aarch64.rpm"
								},
								"name":"kernel-devel-5.10.0-307.0.0.210.oe2203sp4.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP4"
									},
									"product_id":"kernel-headers-5.10.0-307.0.0.210.oe2203sp4.aarch64.rpm",
									"name":"kernel-headers-5.10.0-307.0.0.210.oe2203sp4.aarch64.rpm"
								},
								"name":"kernel-headers-5.10.0-307.0.0.210.oe2203sp4.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP4"
									},
									"product_id":"kernel-source-5.10.0-307.0.0.210.oe2203sp4.aarch64.rpm",
									"name":"kernel-source-5.10.0-307.0.0.210.oe2203sp4.aarch64.rpm"
								},
								"name":"kernel-source-5.10.0-307.0.0.210.oe2203sp4.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP4"
									},
									"product_id":"kernel-tools-5.10.0-307.0.0.210.oe2203sp4.aarch64.rpm",
									"name":"kernel-tools-5.10.0-307.0.0.210.oe2203sp4.aarch64.rpm"
								},
								"name":"kernel-tools-5.10.0-307.0.0.210.oe2203sp4.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP4"
									},
									"product_id":"kernel-tools-debuginfo-5.10.0-307.0.0.210.oe2203sp4.aarch64.rpm",
									"name":"kernel-tools-debuginfo-5.10.0-307.0.0.210.oe2203sp4.aarch64.rpm"
								},
								"name":"kernel-tools-debuginfo-5.10.0-307.0.0.210.oe2203sp4.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP4"
									},
									"product_id":"kernel-tools-devel-5.10.0-307.0.0.210.oe2203sp4.aarch64.rpm",
									"name":"kernel-tools-devel-5.10.0-307.0.0.210.oe2203sp4.aarch64.rpm"
								},
								"name":"kernel-tools-devel-5.10.0-307.0.0.210.oe2203sp4.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP4"
									},
									"product_id":"perf-5.10.0-307.0.0.210.oe2203sp4.aarch64.rpm",
									"name":"perf-5.10.0-307.0.0.210.oe2203sp4.aarch64.rpm"
								},
								"name":"perf-5.10.0-307.0.0.210.oe2203sp4.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP4"
									},
									"product_id":"perf-debuginfo-5.10.0-307.0.0.210.oe2203sp4.aarch64.rpm",
									"name":"perf-debuginfo-5.10.0-307.0.0.210.oe2203sp4.aarch64.rpm"
								},
								"name":"perf-debuginfo-5.10.0-307.0.0.210.oe2203sp4.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP4"
									},
									"product_id":"python3-perf-5.10.0-307.0.0.210.oe2203sp4.aarch64.rpm",
									"name":"python3-perf-5.10.0-307.0.0.210.oe2203sp4.aarch64.rpm"
								},
								"name":"python3-perf-5.10.0-307.0.0.210.oe2203sp4.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP4"
									},
									"product_id":"python3-perf-debuginfo-5.10.0-307.0.0.210.oe2203sp4.aarch64.rpm",
									"name":"python3-perf-debuginfo-5.10.0-307.0.0.210.oe2203sp4.aarch64.rpm"
								},
								"name":"python3-perf-debuginfo-5.10.0-307.0.0.210.oe2203sp4.aarch64.rpm",
								"category":"product_version"
							}
						],
						"category":"architecture"
					}
				]
			}
		],
		"relationships":[
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP4",
				"product_reference":"bpftool-5.10.0-307.0.0.210.oe2203sp4.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP4:bpftool-5.10.0-307.0.0.210.oe2203sp4.x86_64",
					"name":"bpftool-5.10.0-307.0.0.210.oe2203sp4.x86_64 as a component of openEuler-22.03-LTS-SP4"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP4",
				"product_reference":"bpftool-debuginfo-5.10.0-307.0.0.210.oe2203sp4.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP4:bpftool-debuginfo-5.10.0-307.0.0.210.oe2203sp4.x86_64",
					"name":"bpftool-debuginfo-5.10.0-307.0.0.210.oe2203sp4.x86_64 as a component of openEuler-22.03-LTS-SP4"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP4",
				"product_reference":"kernel-5.10.0-307.0.0.210.oe2203sp4.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP4:kernel-5.10.0-307.0.0.210.oe2203sp4.x86_64",
					"name":"kernel-5.10.0-307.0.0.210.oe2203sp4.x86_64 as a component of openEuler-22.03-LTS-SP4"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP4",
				"product_reference":"kernel-debuginfo-5.10.0-307.0.0.210.oe2203sp4.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP4:kernel-debuginfo-5.10.0-307.0.0.210.oe2203sp4.x86_64",
					"name":"kernel-debuginfo-5.10.0-307.0.0.210.oe2203sp4.x86_64 as a component of openEuler-22.03-LTS-SP4"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP4",
				"product_reference":"kernel-debugsource-5.10.0-307.0.0.210.oe2203sp4.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP4:kernel-debugsource-5.10.0-307.0.0.210.oe2203sp4.x86_64",
					"name":"kernel-debugsource-5.10.0-307.0.0.210.oe2203sp4.x86_64 as a component of openEuler-22.03-LTS-SP4"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP4",
				"product_reference":"kernel-devel-5.10.0-307.0.0.210.oe2203sp4.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP4:kernel-devel-5.10.0-307.0.0.210.oe2203sp4.x86_64",
					"name":"kernel-devel-5.10.0-307.0.0.210.oe2203sp4.x86_64 as a component of openEuler-22.03-LTS-SP4"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP4",
				"product_reference":"kernel-headers-5.10.0-307.0.0.210.oe2203sp4.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP4:kernel-headers-5.10.0-307.0.0.210.oe2203sp4.x86_64",
					"name":"kernel-headers-5.10.0-307.0.0.210.oe2203sp4.x86_64 as a component of openEuler-22.03-LTS-SP4"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP4",
				"product_reference":"kernel-source-5.10.0-307.0.0.210.oe2203sp4.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP4:kernel-source-5.10.0-307.0.0.210.oe2203sp4.x86_64",
					"name":"kernel-source-5.10.0-307.0.0.210.oe2203sp4.x86_64 as a component of openEuler-22.03-LTS-SP4"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP4",
				"product_reference":"kernel-tools-5.10.0-307.0.0.210.oe2203sp4.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP4:kernel-tools-5.10.0-307.0.0.210.oe2203sp4.x86_64",
					"name":"kernel-tools-5.10.0-307.0.0.210.oe2203sp4.x86_64 as a component of openEuler-22.03-LTS-SP4"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP4",
				"product_reference":"kernel-tools-debuginfo-5.10.0-307.0.0.210.oe2203sp4.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP4:kernel-tools-debuginfo-5.10.0-307.0.0.210.oe2203sp4.x86_64",
					"name":"kernel-tools-debuginfo-5.10.0-307.0.0.210.oe2203sp4.x86_64 as a component of openEuler-22.03-LTS-SP4"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP4",
				"product_reference":"kernel-tools-devel-5.10.0-307.0.0.210.oe2203sp4.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP4:kernel-tools-devel-5.10.0-307.0.0.210.oe2203sp4.x86_64",
					"name":"kernel-tools-devel-5.10.0-307.0.0.210.oe2203sp4.x86_64 as a component of openEuler-22.03-LTS-SP4"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP4",
				"product_reference":"perf-5.10.0-307.0.0.210.oe2203sp4.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP4:perf-5.10.0-307.0.0.210.oe2203sp4.x86_64",
					"name":"perf-5.10.0-307.0.0.210.oe2203sp4.x86_64 as a component of openEuler-22.03-LTS-SP4"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP4",
				"product_reference":"perf-debuginfo-5.10.0-307.0.0.210.oe2203sp4.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP4:perf-debuginfo-5.10.0-307.0.0.210.oe2203sp4.x86_64",
					"name":"perf-debuginfo-5.10.0-307.0.0.210.oe2203sp4.x86_64 as a component of openEuler-22.03-LTS-SP4"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP4",
				"product_reference":"python3-perf-5.10.0-307.0.0.210.oe2203sp4.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP4:python3-perf-5.10.0-307.0.0.210.oe2203sp4.x86_64",
					"name":"python3-perf-5.10.0-307.0.0.210.oe2203sp4.x86_64 as a component of openEuler-22.03-LTS-SP4"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP4",
				"product_reference":"python3-perf-debuginfo-5.10.0-307.0.0.210.oe2203sp4.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP4:python3-perf-debuginfo-5.10.0-307.0.0.210.oe2203sp4.x86_64",
					"name":"python3-perf-debuginfo-5.10.0-307.0.0.210.oe2203sp4.x86_64 as a component of openEuler-22.03-LTS-SP4"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP4",
				"product_reference":"kernel-5.10.0-307.0.0.210.oe2203sp4.src.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP4:kernel-5.10.0-307.0.0.210.oe2203sp4.src",
					"name":"kernel-5.10.0-307.0.0.210.oe2203sp4.src as a component of openEuler-22.03-LTS-SP4"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP4",
				"product_reference":"bpftool-5.10.0-307.0.0.210.oe2203sp4.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP4:bpftool-5.10.0-307.0.0.210.oe2203sp4.aarch64",
					"name":"bpftool-5.10.0-307.0.0.210.oe2203sp4.aarch64 as a component of openEuler-22.03-LTS-SP4"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP4",
				"product_reference":"bpftool-debuginfo-5.10.0-307.0.0.210.oe2203sp4.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP4:bpftool-debuginfo-5.10.0-307.0.0.210.oe2203sp4.aarch64",
					"name":"bpftool-debuginfo-5.10.0-307.0.0.210.oe2203sp4.aarch64 as a component of openEuler-22.03-LTS-SP4"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP4",
				"product_reference":"kernel-5.10.0-307.0.0.210.oe2203sp4.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP4:kernel-5.10.0-307.0.0.210.oe2203sp4.aarch64",
					"name":"kernel-5.10.0-307.0.0.210.oe2203sp4.aarch64 as a component of openEuler-22.03-LTS-SP4"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP4",
				"product_reference":"kernel-debuginfo-5.10.0-307.0.0.210.oe2203sp4.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP4:kernel-debuginfo-5.10.0-307.0.0.210.oe2203sp4.aarch64",
					"name":"kernel-debuginfo-5.10.0-307.0.0.210.oe2203sp4.aarch64 as a component of openEuler-22.03-LTS-SP4"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP4",
				"product_reference":"kernel-debugsource-5.10.0-307.0.0.210.oe2203sp4.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP4:kernel-debugsource-5.10.0-307.0.0.210.oe2203sp4.aarch64",
					"name":"kernel-debugsource-5.10.0-307.0.0.210.oe2203sp4.aarch64 as a component of openEuler-22.03-LTS-SP4"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP4",
				"product_reference":"kernel-devel-5.10.0-307.0.0.210.oe2203sp4.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP4:kernel-devel-5.10.0-307.0.0.210.oe2203sp4.aarch64",
					"name":"kernel-devel-5.10.0-307.0.0.210.oe2203sp4.aarch64 as a component of openEuler-22.03-LTS-SP4"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP4",
				"product_reference":"kernel-headers-5.10.0-307.0.0.210.oe2203sp4.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP4:kernel-headers-5.10.0-307.0.0.210.oe2203sp4.aarch64",
					"name":"kernel-headers-5.10.0-307.0.0.210.oe2203sp4.aarch64 as a component of openEuler-22.03-LTS-SP4"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP4",
				"product_reference":"kernel-source-5.10.0-307.0.0.210.oe2203sp4.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP4:kernel-source-5.10.0-307.0.0.210.oe2203sp4.aarch64",
					"name":"kernel-source-5.10.0-307.0.0.210.oe2203sp4.aarch64 as a component of openEuler-22.03-LTS-SP4"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP4",
				"product_reference":"kernel-tools-5.10.0-307.0.0.210.oe2203sp4.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP4:kernel-tools-5.10.0-307.0.0.210.oe2203sp4.aarch64",
					"name":"kernel-tools-5.10.0-307.0.0.210.oe2203sp4.aarch64 as a component of openEuler-22.03-LTS-SP4"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP4",
				"product_reference":"kernel-tools-debuginfo-5.10.0-307.0.0.210.oe2203sp4.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP4:kernel-tools-debuginfo-5.10.0-307.0.0.210.oe2203sp4.aarch64",
					"name":"kernel-tools-debuginfo-5.10.0-307.0.0.210.oe2203sp4.aarch64 as a component of openEuler-22.03-LTS-SP4"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP4",
				"product_reference":"kernel-tools-devel-5.10.0-307.0.0.210.oe2203sp4.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP4:kernel-tools-devel-5.10.0-307.0.0.210.oe2203sp4.aarch64",
					"name":"kernel-tools-devel-5.10.0-307.0.0.210.oe2203sp4.aarch64 as a component of openEuler-22.03-LTS-SP4"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP4",
				"product_reference":"perf-5.10.0-307.0.0.210.oe2203sp4.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP4:perf-5.10.0-307.0.0.210.oe2203sp4.aarch64",
					"name":"perf-5.10.0-307.0.0.210.oe2203sp4.aarch64 as a component of openEuler-22.03-LTS-SP4"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP4",
				"product_reference":"perf-debuginfo-5.10.0-307.0.0.210.oe2203sp4.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP4:perf-debuginfo-5.10.0-307.0.0.210.oe2203sp4.aarch64",
					"name":"perf-debuginfo-5.10.0-307.0.0.210.oe2203sp4.aarch64 as a component of openEuler-22.03-LTS-SP4"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP4",
				"product_reference":"python3-perf-5.10.0-307.0.0.210.oe2203sp4.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP4:python3-perf-5.10.0-307.0.0.210.oe2203sp4.aarch64",
					"name":"python3-perf-5.10.0-307.0.0.210.oe2203sp4.aarch64 as a component of openEuler-22.03-LTS-SP4"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP4",
				"product_reference":"python3-perf-debuginfo-5.10.0-307.0.0.210.oe2203sp4.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP4:python3-perf-debuginfo-5.10.0-307.0.0.210.oe2203sp4.aarch64",
					"name":"python3-perf-debuginfo-5.10.0-307.0.0.210.oe2203sp4.aarch64 as a component of openEuler-22.03-LTS-SP4"
				},
				"category":"default_component_of"
			}
		]
	},
	"vulnerabilities":[
		{
			"cve":"CVE-2026-23243",
			"notes":[
				{
					"text":"A vulnerability exists in the RDMA/umad component of the Linux kernel when processing user-space data. The ib_umad_write function calculates data_len based on user-controlled count and MAD header sizes. When a mismatched user MAD header size and RMPP header length are provided, data_len can become negative and be passed to the ib_create_send_mad() function. This can cause subsequent padding calculations to exceed the segment size, ultimately triggering an out-of-bounds memory write (memset) in the alloc_send_rmpp_list() function. An attacker could potentially exploit this vulnerability to cause kernel memory corruption, affecting system stability and confidentiality.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP4:bpftool-5.10.0-307.0.0.210.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:bpftool-debuginfo-5.10.0-307.0.0.210.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-5.10.0-307.0.0.210.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-debuginfo-5.10.0-307.0.0.210.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-debugsource-5.10.0-307.0.0.210.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-devel-5.10.0-307.0.0.210.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-headers-5.10.0-307.0.0.210.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-source-5.10.0-307.0.0.210.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-tools-5.10.0-307.0.0.210.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-tools-debuginfo-5.10.0-307.0.0.210.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-tools-devel-5.10.0-307.0.0.210.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:perf-5.10.0-307.0.0.210.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:perf-debuginfo-5.10.0-307.0.0.210.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:python3-perf-5.10.0-307.0.0.210.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:python3-perf-debuginfo-5.10.0-307.0.0.210.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-5.10.0-307.0.0.210.oe2203sp4.src",
					"openEuler-22.03-LTS-SP4:bpftool-5.10.0-307.0.0.210.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:bpftool-debuginfo-5.10.0-307.0.0.210.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-5.10.0-307.0.0.210.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-debuginfo-5.10.0-307.0.0.210.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-debugsource-5.10.0-307.0.0.210.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-devel-5.10.0-307.0.0.210.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-headers-5.10.0-307.0.0.210.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-source-5.10.0-307.0.0.210.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-tools-5.10.0-307.0.0.210.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-tools-debuginfo-5.10.0-307.0.0.210.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-tools-devel-5.10.0-307.0.0.210.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:perf-5.10.0-307.0.0.210.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:perf-debuginfo-5.10.0-307.0.0.210.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:python3-perf-5.10.0-307.0.0.210.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:python3-perf-debuginfo-5.10.0-307.0.0.210.oe2203sp4.aarch64"
				]
			},
			"remediations":[
				{
					"product_ids":{"$ref":"$.vulnerabilities[0].product_status.fixed"},
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-1831"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.3,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H",
						"version":"3.1"
					},
					"products":{"$ref":"$.vulnerabilities[0].product_status.fixed"}
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2026-23243"
		},
		{
			"cve":"CVE-2026-23352",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nx86/efi: defer freeing of boot services memory\n\nefi_free_boot_services() frees memory occupied by EFI_BOOT_SERVICES_CODE and EFI_BOOT_SERVICES_DATA using memblock_free_late().\n\nThere are two issue with that: memblock_free_late() should be used for memory allocated with memblock_alloc() while the memory reserved with memblock_reserve() should be freed with free_reserved_area().\n\nMore acutely, with CONFIG_DEFERRED_STRUCT_PAGE_INIT=y efi_free_boot_services() is called before deferred initialization of the memory map is complete.\n\nBenjamin Herrenschmidt reports that this causes a leak of ~140MB of RAM on EC2 t3a.nano instances which only have 512MB or RAM.\n\nIf the freed memory resides in the areas that memory map for them is still uninitialized, they won't be actually freed because memblock_free_late() calls memblock_free_pages() and the latter skips uninitialized pages.\n\nUsing free_reserved_area() at this point is also problematic because __free_page() accesses the buddy of the freed page and that again might end up in uninitialized part of the memory map.\n\nDelaying the entire efi_free_boot_services() could be problematic because in addition to freeing boot services memory it updates efi.memmap without any synchronization and that's undesirable late in boot when there is concurrency.\n\nMore robust approach is to only defer freeing of the EFI boot services memory.\n\nSplit efi_free_boot_services() in two. First efi_unmap_boot_services() collects ranges that should be freed into an array then efi_free_boot_services() later frees them after deferred init is complete.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":{"$ref":"$.vulnerabilities[0].product_status.fixed"}
			},
			"remediations":[
				{
					"product_ids":{"$ref":"$.vulnerabilities[0].product_status.fixed"},
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-1831"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":{"$ref":"$.vulnerabilities[0].product_status.fixed"}
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2026-23352"
		},
		{
			"cve":"CVE-2026-23388",
			"notes":[
				{
					"text":"In the Linux kernel, a vulnerability has been resolved in Squashfs component: check metadata block offset is within range. Syzkaller reports a \"general protection fault in squashfs_copy_data\". This is ultimately caused by a corrupted index look-up table, which produces a negative metadata block offset. This is subsequently passed to squashfs_copy_data (via squashfs_read_metadata) where the negative offset causes an out of bounds access. The fix is to check that the offset is within range in squashfs_read_metadata. This will trap this and other cases.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":{"$ref":"$.vulnerabilities[0].product_status.fixed"}
			},
			"remediations":[
				{
					"product_ids":{"$ref":"$.vulnerabilities[0].product_status.fixed"},
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-1831"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":6.6,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
						"version":"3.1"
					},
					"products":{"$ref":"$.vulnerabilities[0].product_status.fixed"}
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2026-23388"
		}
	]
}