Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/kernel@5.14.0-427.121.1?arch=el9_4
Typerpm
Namespaceredhat
Namekernel
Version5.14.0-427.121.1
Qualifiers
arch el9_4
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-4y9e-89wb-gbaz
vulnerability_id VCID-4y9e-89wb-gbaz
summary kernel: Kernel: Privilege escalation or denial of service in nf_tables via inverted element activity check
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-23111.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-23111.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-23111
reference_id
reference_type
scores
0
value 0.00014
scoring_system epss
scoring_elements 0.02344
published_at 2026-04-07T12:55:00Z
1
value 0.00014
scoring_system epss
scoring_elements 0.02338
published_at 2026-04-02T12:55:00Z
2
value 0.00014
scoring_system epss
scoring_elements 0.02348
published_at 2026-04-08T12:55:00Z
3
value 0.00015
scoring_system epss
scoring_elements 0.03197
published_at 2026-04-12T12:55:00Z
4
value 0.00015
scoring_system epss
scoring_elements 0.03266
published_at 2026-04-09T12:55:00Z
5
value 0.00015
scoring_system epss
scoring_elements 0.03225
published_at 2026-04-11T12:55:00Z
6
value 0.00015
scoring_system epss
scoring_elements 0.0315
published_at 2026-04-16T12:55:00Z
7
value 0.00015
scoring_system epss
scoring_elements 0.0316
published_at 2026-04-18T12:55:00Z
8
value 0.00015
scoring_system epss
scoring_elements 0.03281
published_at 2026-04-21T12:55:00Z
9
value 0.00015
scoring_system epss
scoring_elements 0.03176
published_at 2026-04-13T12:55:00Z
10
value 0.00018
scoring_system epss
scoring_elements 0.04533
published_at 2026-04-24T12:55:00Z
11
value 0.00018
scoring_system epss
scoring_elements 0.04554
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-23111
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23111
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23111
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2439687
reference_id 2439687
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2439687
5
reference_url https://access.redhat.com/errata/RHSA-2026:10108
reference_id RHSA-2026:10108
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:10108
6
reference_url https://access.redhat.com/errata/RHSA-2026:6570
reference_id RHSA-2026:6570
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6570
7
reference_url https://access.redhat.com/errata/RHSA-2026:9112
reference_id RHSA-2026:9112
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9112
8
reference_url https://usn.ubuntu.com/8148-1/
reference_id USN-8148-1
reference_type
scores
url https://usn.ubuntu.com/8148-1/
9
reference_url https://usn.ubuntu.com/8148-2/
reference_id USN-8148-2
reference_type
scores
url https://usn.ubuntu.com/8148-2/
10
reference_url https://usn.ubuntu.com/8148-3/
reference_id USN-8148-3
reference_type
scores
url https://usn.ubuntu.com/8148-3/
11
reference_url https://usn.ubuntu.com/8148-4/
reference_id USN-8148-4
reference_type
scores
url https://usn.ubuntu.com/8148-4/
12
reference_url https://usn.ubuntu.com/8148-5/
reference_id USN-8148-5
reference_type
scores
url https://usn.ubuntu.com/8148-5/
13
reference_url https://usn.ubuntu.com/8148-6/
reference_id USN-8148-6
reference_type
scores
url https://usn.ubuntu.com/8148-6/
14
reference_url https://usn.ubuntu.com/8148-7/
reference_id USN-8148-7
reference_type
scores
url https://usn.ubuntu.com/8148-7/
15
reference_url https://usn.ubuntu.com/8149-1/
reference_id USN-8149-1
reference_type
scores
url https://usn.ubuntu.com/8149-1/
16
reference_url https://usn.ubuntu.com/8149-2/
reference_id USN-8149-2
reference_type
scores
url https://usn.ubuntu.com/8149-2/
17
reference_url https://usn.ubuntu.com/8149-3/
reference_id USN-8149-3
reference_type
scores
url https://usn.ubuntu.com/8149-3/
18
reference_url https://usn.ubuntu.com/8152-1/
reference_id USN-8152-1
reference_type
scores
url https://usn.ubuntu.com/8152-1/
19
reference_url https://usn.ubuntu.com/8159-1/
reference_id USN-8159-1
reference_type
scores
url https://usn.ubuntu.com/8159-1/
20
reference_url https://usn.ubuntu.com/8159-2/
reference_id USN-8159-2
reference_type
scores
url https://usn.ubuntu.com/8159-2/
21
reference_url https://usn.ubuntu.com/8159-3/
reference_id USN-8159-3
reference_type
scores
url https://usn.ubuntu.com/8159-3/
22
reference_url https://usn.ubuntu.com/8162-1/
reference_id USN-8162-1
reference_type
scores
url https://usn.ubuntu.com/8162-1/
23
reference_url https://usn.ubuntu.com/8163-1/
reference_id USN-8163-1
reference_type
scores
url https://usn.ubuntu.com/8163-1/
24
reference_url https://usn.ubuntu.com/8163-2/
reference_id USN-8163-2
reference_type
scores
url https://usn.ubuntu.com/8163-2/
25
reference_url https://usn.ubuntu.com/8164-1/
reference_id USN-8164-1
reference_type
scores
url https://usn.ubuntu.com/8164-1/
26
reference_url https://usn.ubuntu.com/8165-1/
reference_id USN-8165-1
reference_type
scores
url https://usn.ubuntu.com/8165-1/
27
reference_url https://usn.ubuntu.com/8188-1/
reference_id USN-8188-1
reference_type
scores
url https://usn.ubuntu.com/8188-1/
28
reference_url https://usn.ubuntu.com/8203-1/
reference_id USN-8203-1
reference_type
scores
url https://usn.ubuntu.com/8203-1/
fixed_packages
aliases CVE-2026-23111
risk_score 3.1
exploitability 0.5
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4y9e-89wb-gbaz
1
url VCID-6u26-3zuf-xqee
vulnerability_id VCID-6u26-3zuf-xqee
summary kernel: mlxsw: spectrum_mr: Fix use-after-free when updating multicast route stats
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-68800.json
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-68800.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-68800
reference_id
reference_type
scores
0
value 0.00053
scoring_system epss
scoring_elements 0.16694
published_at 2026-04-02T12:55:00Z
1
value 0.00053
scoring_system epss
scoring_elements 0.16755
published_at 2026-04-04T12:55:00Z
2
value 0.00053
scoring_system epss
scoring_elements 0.16546
published_at 2026-04-21T12:55:00Z
3
value 0.00053
scoring_system epss
scoring_elements 0.16631
published_at 2026-04-08T12:55:00Z
4
value 0.00053
scoring_system epss
scoring_elements 0.16684
published_at 2026-04-09T12:55:00Z
5
value 0.00053
scoring_system epss
scoring_elements 0.16662
published_at 2026-04-11T12:55:00Z
6
value 0.00053
scoring_system epss
scoring_elements 0.16621
published_at 2026-04-12T12:55:00Z
7
value 0.00053
scoring_system epss
scoring_elements 0.16561
published_at 2026-04-13T12:55:00Z
8
value 0.00053
scoring_system epss
scoring_elements 0.16499
published_at 2026-04-16T12:55:00Z
9
value 0.00053
scoring_system epss
scoring_elements 0.16508
published_at 2026-04-18T12:55:00Z
10
value 0.00053
scoring_system epss
scoring_elements 0.16441
published_at 2026-04-24T12:55:00Z
11
value 0.00053
scoring_system epss
scoring_elements 0.16434
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-68800
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68800
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2429065
reference_id 2429065
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2429065
5
reference_url https://access.redhat.com/errata/RHSA-2026:10108
reference_id RHSA-2026:10108
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:10108
6
reference_url https://access.redhat.com/errata/RHSA-2026:3083
reference_id RHSA-2026:3083
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3083
7
reference_url https://access.redhat.com/errata/RHSA-2026:3110
reference_id RHSA-2026:3110
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3110
8
reference_url https://access.redhat.com/errata/RHSA-2026:3275
reference_id RHSA-2026:3275
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3275
9
reference_url https://access.redhat.com/errata/RHSA-2026:3966
reference_id RHSA-2026:3966
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3966
10
reference_url https://access.redhat.com/errata/RHSA-2026:4759
reference_id RHSA-2026:4759
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4759
11
reference_url https://access.redhat.com/errata/RHSA-2026:6164
reference_id RHSA-2026:6164
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6164
12
reference_url https://access.redhat.com/errata/RHSA-2026:9512
reference_id RHSA-2026:9512
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9512
13
reference_url https://access.redhat.com/errata/RHSA-2026:9644
reference_id RHSA-2026:9644
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9644
14
reference_url https://usn.ubuntu.com/8096-1/
reference_id USN-8096-1
reference_type
scores
url https://usn.ubuntu.com/8096-1/
15
reference_url https://usn.ubuntu.com/8096-2/
reference_id USN-8096-2
reference_type
scores
url https://usn.ubuntu.com/8096-2/
16
reference_url https://usn.ubuntu.com/8096-3/
reference_id USN-8096-3
reference_type
scores
url https://usn.ubuntu.com/8096-3/
17
reference_url https://usn.ubuntu.com/8096-4/
reference_id USN-8096-4
reference_type
scores
url https://usn.ubuntu.com/8096-4/
18
reference_url https://usn.ubuntu.com/8096-5/
reference_id USN-8096-5
reference_type
scores
url https://usn.ubuntu.com/8096-5/
19
reference_url https://usn.ubuntu.com/8116-1/
reference_id USN-8116-1
reference_type
scores
url https://usn.ubuntu.com/8116-1/
20
reference_url https://usn.ubuntu.com/8141-1/
reference_id USN-8141-1
reference_type
scores
url https://usn.ubuntu.com/8141-1/
21
reference_url https://usn.ubuntu.com/8163-1/
reference_id USN-8163-1
reference_type
scores
url https://usn.ubuntu.com/8163-1/
22
reference_url https://usn.ubuntu.com/8163-2/
reference_id USN-8163-2
reference_type
scores
url https://usn.ubuntu.com/8163-2/
23
reference_url https://usn.ubuntu.com/8177-1/
reference_id USN-8177-1
reference_type
scores
url https://usn.ubuntu.com/8177-1/
24
reference_url https://usn.ubuntu.com/8177-2/
reference_id USN-8177-2
reference_type
scores
url https://usn.ubuntu.com/8177-2/
25
reference_url https://usn.ubuntu.com/8179-1/
reference_id USN-8179-1
reference_type
scores
url https://usn.ubuntu.com/8179-1/
26
reference_url https://usn.ubuntu.com/8179-2/
reference_id USN-8179-2
reference_type
scores
url https://usn.ubuntu.com/8179-2/
27
reference_url https://usn.ubuntu.com/8179-3/
reference_id USN-8179-3
reference_type
scores
url https://usn.ubuntu.com/8179-3/
28
reference_url https://usn.ubuntu.com/8183-1/
reference_id USN-8183-1
reference_type
scores
url https://usn.ubuntu.com/8183-1/
29
reference_url https://usn.ubuntu.com/8183-2/
reference_id USN-8183-2
reference_type
scores
url https://usn.ubuntu.com/8183-2/
30
reference_url https://usn.ubuntu.com/8184-1/
reference_id USN-8184-1
reference_type
scores
url https://usn.ubuntu.com/8184-1/
31
reference_url https://usn.ubuntu.com/8185-1/
reference_id USN-8185-1
reference_type
scores
url https://usn.ubuntu.com/8185-1/
32
reference_url https://usn.ubuntu.com/8203-1/
reference_id USN-8203-1
reference_type
scores
url https://usn.ubuntu.com/8203-1/
33
reference_url https://usn.ubuntu.com/8204-1/
reference_id USN-8204-1
reference_type
scores
url https://usn.ubuntu.com/8204-1/
fixed_packages
aliases CVE-2025-68800
risk_score 3.3
exploitability 0.5
weighted_severity 6.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6u26-3zuf-xqee
2
url VCID-9kuz-7fag-4qhv
vulnerability_id VCID-9kuz-7fag-4qhv
summary kernel: kernel: Privilege escalation or denial of service via use-after-free in nf_tables_addchain()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-23231.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-23231.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-23231
reference_id
reference_type
scores
0
value 0.00013
scoring_system epss
scoring_elements 0.02315
published_at 2026-04-02T12:55:00Z
1
value 0.00013
scoring_system epss
scoring_elements 0.02324
published_at 2026-04-04T12:55:00Z
2
value 0.00015
scoring_system epss
scoring_elements 0.03404
published_at 2026-04-09T12:55:00Z
3
value 0.00015
scoring_system epss
scoring_elements 0.03362
published_at 2026-04-11T12:55:00Z
4
value 0.00015
scoring_system epss
scoring_elements 0.03333
published_at 2026-04-12T12:55:00Z
5
value 0.00015
scoring_system epss
scoring_elements 0.0331
published_at 2026-04-13T12:55:00Z
6
value 0.00015
scoring_system epss
scoring_elements 0.03286
published_at 2026-04-16T12:55:00Z
7
value 0.00015
scoring_system epss
scoring_elements 0.03297
published_at 2026-04-18T12:55:00Z
8
value 0.00015
scoring_system epss
scoring_elements 0.03414
published_at 2026-04-21T12:55:00Z
9
value 0.00015
scoring_system epss
scoring_elements 0.034
published_at 2026-04-24T12:55:00Z
10
value 0.00015
scoring_system epss
scoring_elements 0.03406
published_at 2026-04-26T12:55:00Z
11
value 0.00015
scoring_system epss
scoring_elements 0.03379
published_at 2026-04-07T12:55:00Z
12
value 0.00015
scoring_system epss
scoring_elements 0.03383
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-23231
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23231
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23231
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2444376
reference_id 2444376
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2444376
5
reference_url https://access.redhat.com/errata/RHSA-2026:10108
reference_id RHSA-2026:10108
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:10108
6
reference_url https://access.redhat.com/errata/RHSA-2026:6053
reference_id RHSA-2026:6053
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6053
7
reference_url https://access.redhat.com/errata/RHSA-2026:6570
reference_id RHSA-2026:6570
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6570
8
reference_url https://access.redhat.com/errata/RHSA-2026:6571
reference_id RHSA-2026:6571
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6571
9
reference_url https://access.redhat.com/errata/RHSA-2026:6572
reference_id RHSA-2026:6572
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6572
10
reference_url https://access.redhat.com/errata/RHSA-2026:6940
reference_id RHSA-2026:6940
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6940
11
reference_url https://access.redhat.com/errata/RHSA-2026:9095
reference_id RHSA-2026:9095
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9095
12
reference_url https://access.redhat.com/errata/RHSA-2026:9512
reference_id RHSA-2026:9512
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9512
13
reference_url https://access.redhat.com/errata/RHSA-2026:9513
reference_id RHSA-2026:9513
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9513
14
reference_url https://access.redhat.com/errata/RHSA-2026:9514
reference_id RHSA-2026:9514
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9514
15
reference_url https://access.redhat.com/errata/RHSA-2026:9515
reference_id RHSA-2026:9515
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9515
16
reference_url https://access.redhat.com/errata/RHSA-2026:9643
reference_id RHSA-2026:9643
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9643
17
reference_url https://access.redhat.com/errata/RHSA-2026:9644
reference_id RHSA-2026:9644
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9644
18
reference_url https://access.redhat.com/errata/RHSA-2026:9835
reference_id RHSA-2026:9835
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9835
19
reference_url https://access.redhat.com/errata/RHSA-2026:9836
reference_id RHSA-2026:9836
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9836
20
reference_url https://access.redhat.com/errata/RHSA-2026:9870
reference_id RHSA-2026:9870
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9870
fixed_packages
aliases CVE-2026-23231
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9kuz-7fag-4qhv
3
url VCID-dt7e-edy8-d3b4
vulnerability_id VCID-dt7e-edy8-d3b4
summary kernel: Linux kernel: Local denial of service and memory leak in DAMON sysfs via setup failure
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-23144.json
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-23144.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-23144
reference_id
reference_type
scores
0
value 0.00015
scoring_system epss
scoring_elements 0.03144
published_at 2026-04-02T12:55:00Z
1
value 0.00015
scoring_system epss
scoring_elements 0.03156
published_at 2026-04-04T12:55:00Z
2
value 0.00015
scoring_system epss
scoring_elements 0.03159
published_at 2026-04-07T12:55:00Z
3
value 0.00015
scoring_system epss
scoring_elements 0.03164
published_at 2026-04-08T12:55:00Z
4
value 0.00015
scoring_system epss
scoring_elements 0.03189
published_at 2026-04-09T12:55:00Z
5
value 0.00015
scoring_system epss
scoring_elements 0.03149
published_at 2026-04-11T12:55:00Z
6
value 0.00015
scoring_system epss
scoring_elements 0.03083
published_at 2026-04-16T12:55:00Z
7
value 0.00015
scoring_system epss
scoring_elements 0.03091
published_at 2026-04-18T12:55:00Z
8
value 0.00015
scoring_system epss
scoring_elements 0.0321
published_at 2026-04-21T12:55:00Z
9
value 0.00015
scoring_system epss
scoring_elements 0.03123
published_at 2026-04-12T12:55:00Z
10
value 0.00015
scoring_system epss
scoring_elements 0.03108
published_at 2026-04-13T12:55:00Z
11
value 0.00018
scoring_system epss
scoring_elements 0.04478
published_at 2026-04-26T12:55:00Z
12
value 0.00018
scoring_system epss
scoring_elements 0.04457
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-23144
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2439872
reference_id 2439872
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2439872
4
reference_url https://access.redhat.com/errata/RHSA-2026:10108
reference_id RHSA-2026:10108
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:10108
5
reference_url https://access.redhat.com/errata/RHSA-2026:6153
reference_id RHSA-2026:6153
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6153
6
reference_url https://access.redhat.com/errata/RHSA-2026:6632
reference_id RHSA-2026:6632
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6632
7
reference_url https://access.redhat.com/errata/RHSA-2026:8342
reference_id RHSA-2026:8342
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8342
8
reference_url https://access.redhat.com/errata/RHSA-2026:9112
reference_id RHSA-2026:9112
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9112
9
reference_url https://access.redhat.com/errata/RHSA-2026:9512
reference_id RHSA-2026:9512
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9512
10
reference_url https://access.redhat.com/errata/RHSA-2026:9644
reference_id RHSA-2026:9644
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9644
fixed_packages
aliases CVE-2026-23144
risk_score 3.3
exploitability 0.5
weighted_severity 6.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dt7e-edy8-d3b4
4
url VCID-kvbv-df49-gyaj
vulnerability_id VCID-kvbv-df49-gyaj
summary In the Linux kernel, the following vulnerability has been resolved: nfsd: fix heap overflow in NFSv4.0 LOCK replay cache The NFSv4.0 replay cache uses a fixed 112-byte inline buffer (rp_ibuf[NFSD4_REPLAY_ISIZE]) to store encoded operation responses. This size was calculated based on OPEN responses and does not account for LOCK denied responses, which include the conflicting lock owner as a variable-length field up to 1024 bytes (NFS4_OPAQUE_LIMIT). When a LOCK operation is denied due to a conflict with an existing lock that has a large owner, nfsd4_encode_operation() copies the full encoded response into the undersized replay buffer via read_bytes_from_xdr_buf() with no bounds check. This results in a slab-out-of-bounds write of up to 944 bytes past the end of the buffer, corrupting adjacent heap memory. This can be triggered remotely by an unauthenticated attacker with two cooperating NFSv4.0 clients: one sets a lock with a large owner string, then the other requests a conflicting lock to provoke the denial. We could fix this by increasing NFSD4_REPLAY_ISIZE to allow for a full opaque, but that would increase the size of every stateowner, when most lockowners are not that large. Instead, fix this by checking the encoded response length against NFSD4_REPLAY_ISIZE before copying into the replay buffer. If the response is too large, set rp_buflen to 0 to skip caching the replay payload. The status is still cached, and the client already received the correct response on the original request.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31402.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31402.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-31402
reference_id
reference_type
scores
0
value 0.00036
scoring_system epss
scoring_elements 0.10729
published_at 2026-04-08T12:55:00Z
1
value 0.00036
scoring_system epss
scoring_elements 0.10803
published_at 2026-04-04T12:55:00Z
2
value 0.00036
scoring_system epss
scoring_elements 0.10653
published_at 2026-04-07T12:55:00Z
3
value 0.00048
scoring_system epss
scoring_elements 0.14562
published_at 2026-04-16T12:55:00Z
4
value 0.00048
scoring_system epss
scoring_elements 0.14567
published_at 2026-04-18T12:55:00Z
5
value 0.00048
scoring_system epss
scoring_elements 0.14631
published_at 2026-04-21T12:55:00Z
6
value 0.00048
scoring_system epss
scoring_elements 0.14664
published_at 2026-04-24T12:55:00Z
7
value 0.00048
scoring_system epss
scoring_elements 0.14662
published_at 2026-04-26T12:55:00Z
8
value 0.00048
scoring_system epss
scoring_elements 0.14802
published_at 2026-04-09T12:55:00Z
9
value 0.00048
scoring_system epss
scoring_elements 0.1476
published_at 2026-04-11T12:55:00Z
10
value 0.00048
scoring_system epss
scoring_elements 0.14722
published_at 2026-04-12T12:55:00Z
11
value 0.00048
scoring_system epss
scoring_elements 0.14668
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-31402
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31402
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31402
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2454844
reference_id 2454844
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2454844
5
reference_url https://access.redhat.com/errata/RHSA-2026:10108
reference_id RHSA-2026:10108
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:10108
fixed_packages
aliases CVE-2026-31402
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kvbv-df49-gyaj
5
url VCID-ptyj-1y6d-dud1
vulnerability_id VCID-ptyj-1y6d-dud1
summary kernel: Linux kernel: Denial of Service via unsafe requeue in rxrpc_recvmsg
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-23066.json
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-23066.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-23066
reference_id
reference_type
scores
0
value 0.00015
scoring_system epss
scoring_elements 0.02978
published_at 2026-04-02T12:55:00Z
1
value 0.00015
scoring_system epss
scoring_elements 0.0334
published_at 2026-04-04T12:55:00Z
2
value 0.00015
scoring_system epss
scoring_elements 0.03348
published_at 2026-04-07T12:55:00Z
3
value 0.00015
scoring_system epss
scoring_elements 0.03353
published_at 2026-04-08T12:55:00Z
4
value 0.00015
scoring_system epss
scoring_elements 0.03373
published_at 2026-04-09T12:55:00Z
5
value 0.00015
scoring_system epss
scoring_elements 0.03334
published_at 2026-04-11T12:55:00Z
6
value 0.00015
scoring_system epss
scoring_elements 0.03305
published_at 2026-04-12T12:55:00Z
7
value 0.00018
scoring_system epss
scoring_elements 0.04664
published_at 2026-04-26T12:55:00Z
8
value 0.00018
scoring_system epss
scoring_elements 0.04475
published_at 2026-04-13T12:55:00Z
9
value 0.00018
scoring_system epss
scoring_elements 0.04444
published_at 2026-04-16T12:55:00Z
10
value 0.00018
scoring_system epss
scoring_elements 0.04453
published_at 2026-04-18T12:55:00Z
11
value 0.00018
scoring_system epss
scoring_elements 0.04591
published_at 2026-04-21T12:55:00Z
12
value 0.00018
scoring_system epss
scoring_elements 0.0463
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-23066
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23066
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23066
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2436805
reference_id 2436805
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2436805
5
reference_url https://access.redhat.com/errata/RHSA-2026:10108
reference_id RHSA-2026:10108
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:10108
6
reference_url https://access.redhat.com/errata/RHSA-2026:9095
reference_id RHSA-2026:9095
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9095
7
reference_url https://access.redhat.com/errata/RHSA-2026:9112
reference_id RHSA-2026:9112
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9112
8
reference_url https://access.redhat.com/errata/RHSA-2026:9512
reference_id RHSA-2026:9512
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9512
9
reference_url https://access.redhat.com/errata/RHSA-2026:9644
reference_id RHSA-2026:9644
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9644
fixed_packages
aliases CVE-2026-23066
risk_score 3.4
exploitability 0.5
weighted_severity 6.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ptyj-1y6d-dud1
6
url VCID-r4zk-9j6t-uyhg
vulnerability_id VCID-r4zk-9j6t-uyhg
summary kernel: Bluetooth: MGMT: Fix possible UAFs
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-39981.json
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-39981.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-39981
reference_id
reference_type
scores
0
value 0.00024
scoring_system epss
scoring_elements 0.06615
published_at 2026-04-24T12:55:00Z
1
value 0.00031
scoring_system epss
scoring_elements 0.08897
published_at 2026-04-02T12:55:00Z
2
value 0.00031
scoring_system epss
scoring_elements 0.08948
published_at 2026-04-26T12:55:00Z
3
value 0.00031
scoring_system epss
scoring_elements 0.08881
published_at 2026-04-07T12:55:00Z
4
value 0.00031
scoring_system epss
scoring_elements 0.08957
published_at 2026-04-08T12:55:00Z
5
value 0.00031
scoring_system epss
scoring_elements 0.08985
published_at 2026-04-09T12:55:00Z
6
value 0.00031
scoring_system epss
scoring_elements 0.08981
published_at 2026-04-11T12:55:00Z
7
value 0.00031
scoring_system epss
scoring_elements 0.08946
published_at 2026-04-12T12:55:00Z
8
value 0.00031
scoring_system epss
scoring_elements 0.08933
published_at 2026-04-13T12:55:00Z
9
value 0.00031
scoring_system epss
scoring_elements 0.08823
published_at 2026-04-16T12:55:00Z
10
value 0.00031
scoring_system epss
scoring_elements 0.08797
published_at 2026-04-18T12:55:00Z
11
value 0.00031
scoring_system epss
scoring_elements 0.08951
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-39981
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2404105
reference_id 2404105
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2404105
4
reference_url https://access.redhat.com/errata/RHSA-2025:22405
reference_id RHSA-2025:22405
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22405
5
reference_url https://access.redhat.com/errata/RHSA-2025:22854
reference_id RHSA-2025:22854
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22854
6
reference_url https://access.redhat.com/errata/RHSA-2026:0271
reference_id RHSA-2026:0271
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0271
7
reference_url https://access.redhat.com/errata/RHSA-2026:0457
reference_id RHSA-2026:0457
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0457
8
reference_url https://access.redhat.com/errata/RHSA-2026:10108
reference_id RHSA-2026:10108
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:10108
9
reference_url https://access.redhat.com/errata/RHSA-2026:9512
reference_id RHSA-2026:9512
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9512
10
reference_url https://access.redhat.com/errata/RHSA-2026:9644
reference_id RHSA-2026:9644
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9644
11
reference_url https://usn.ubuntu.com/8095-1/
reference_id USN-8095-1
reference_type
scores
url https://usn.ubuntu.com/8095-1/
12
reference_url https://usn.ubuntu.com/8095-2/
reference_id USN-8095-2
reference_type
scores
url https://usn.ubuntu.com/8095-2/
13
reference_url https://usn.ubuntu.com/8095-3/
reference_id USN-8095-3
reference_type
scores
url https://usn.ubuntu.com/8095-3/
14
reference_url https://usn.ubuntu.com/8095-4/
reference_id USN-8095-4
reference_type
scores
url https://usn.ubuntu.com/8095-4/
15
reference_url https://usn.ubuntu.com/8095-5/
reference_id USN-8095-5
reference_type
scores
url https://usn.ubuntu.com/8095-5/
16
reference_url https://usn.ubuntu.com/8100-1/
reference_id USN-8100-1
reference_type
scores
url https://usn.ubuntu.com/8100-1/
17
reference_url https://usn.ubuntu.com/8125-1/
reference_id USN-8125-1
reference_type
scores
url https://usn.ubuntu.com/8125-1/
18
reference_url https://usn.ubuntu.com/8126-1/
reference_id USN-8126-1
reference_type
scores
url https://usn.ubuntu.com/8126-1/
19
reference_url https://usn.ubuntu.com/8165-1/
reference_id USN-8165-1
reference_type
scores
url https://usn.ubuntu.com/8165-1/
fixed_packages
aliases CVE-2025-39981
risk_score 3.3
exploitability 0.5
weighted_severity 6.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-r4zk-9j6t-uyhg
7
url VCID-th3e-y2nm-u7eh
vulnerability_id VCID-th3e-y2nm-u7eh
summary kernel: scsi: target: iscsi: Fix use-after-free in iscsit_dec_session_usage_count()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-23193.json
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-23193.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-23193
reference_id
reference_type
scores
0
value 0.00014
scoring_system epss
scoring_elements 0.02338
published_at 2026-04-02T12:55:00Z
1
value 0.00028
scoring_system epss
scoring_elements 0.07887
published_at 2026-04-09T12:55:00Z
2
value 0.00028
scoring_system epss
scoring_elements 0.07855
published_at 2026-04-04T12:55:00Z
3
value 0.00028
scoring_system epss
scoring_elements 0.07808
published_at 2026-04-07T12:55:00Z
4
value 0.00028
scoring_system epss
scoring_elements 0.07866
published_at 2026-04-08T12:55:00Z
5
value 0.00031
scoring_system epss
scoring_elements 0.0905
published_at 2026-04-11T12:55:00Z
6
value 0.00031
scoring_system epss
scoring_elements 0.08896
published_at 2026-04-16T12:55:00Z
7
value 0.00031
scoring_system epss
scoring_elements 0.08878
published_at 2026-04-18T12:55:00Z
8
value 0.00031
scoring_system epss
scoring_elements 0.09025
published_at 2026-04-21T12:55:00Z
9
value 0.00031
scoring_system epss
scoring_elements 0.09016
published_at 2026-04-12T12:55:00Z
10
value 0.00031
scoring_system epss
scoring_elements 0.09003
published_at 2026-04-13T12:55:00Z
11
value 0.00036
scoring_system epss
scoring_elements 0.1074
published_at 2026-04-26T12:55:00Z
12
value 0.00036
scoring_system epss
scoring_elements 0.10756
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-23193
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23193
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23193
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2439887
reference_id 2439887
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2439887
5
reference_url https://access.redhat.com/errata/RHSA-2026:10108
reference_id RHSA-2026:10108
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:10108
6
reference_url https://access.redhat.com/errata/RHSA-2026:6153
reference_id RHSA-2026:6153
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6153
7
reference_url https://access.redhat.com/errata/RHSA-2026:6571
reference_id RHSA-2026:6571
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6571
8
reference_url https://access.redhat.com/errata/RHSA-2026:6572
reference_id RHSA-2026:6572
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6572
9
reference_url https://access.redhat.com/errata/RHSA-2026:6632
reference_id RHSA-2026:6632
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6632
10
reference_url https://access.redhat.com/errata/RHSA-2026:9095
reference_id RHSA-2026:9095
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9095
11
reference_url https://access.redhat.com/errata/RHSA-2026:9112
reference_id RHSA-2026:9112
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9112
12
reference_url https://access.redhat.com/errata/RHSA-2026:9870
reference_id RHSA-2026:9870
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9870
fixed_packages
aliases CVE-2026-23193
risk_score 3.2
exploitability 0.5
weighted_severity 6.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-th3e-y2nm-u7eh
8
url VCID-u6nn-wr8u-qqdj
vulnerability_id VCID-u6nn-wr8u-qqdj
summary kernel: Linux kernel: Use-after-free in bonding module can cause system crash or arbitrary code execution
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-23171.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-23171.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-23171
reference_id
reference_type
scores
0
value 0.00017
scoring_system epss
scoring_elements 0.03927
published_at 2026-04-02T12:55:00Z
1
value 0.00017
scoring_system epss
scoring_elements 0.03936
published_at 2026-04-04T12:55:00Z
2
value 0.00017
scoring_system epss
scoring_elements 0.03947
published_at 2026-04-07T12:55:00Z
3
value 0.00017
scoring_system epss
scoring_elements 0.03953
published_at 2026-04-08T12:55:00Z
4
value 0.00017
scoring_system epss
scoring_elements 0.03978
published_at 2026-04-09T12:55:00Z
5
value 0.00017
scoring_system epss
scoring_elements 0.03945
published_at 2026-04-11T12:55:00Z
6
value 0.00017
scoring_system epss
scoring_elements 0.03878
published_at 2026-04-16T12:55:00Z
7
value 0.00017
scoring_system epss
scoring_elements 0.03889
published_at 2026-04-18T12:55:00Z
8
value 0.00017
scoring_system epss
scoring_elements 0.04009
published_at 2026-04-21T12:55:00Z
9
value 0.00017
scoring_system epss
scoring_elements 0.03928
published_at 2026-04-12T12:55:00Z
10
value 0.00017
scoring_system epss
scoring_elements 0.03899
published_at 2026-04-13T12:55:00Z
11
value 0.00019
scoring_system epss
scoring_elements 0.05295
published_at 2026-04-26T12:55:00Z
12
value 0.00019
scoring_system epss
scoring_elements 0.05252
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-23171
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2439886
reference_id 2439886
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2439886
4
reference_url https://access.redhat.com/errata/RHSA-2026:10108
reference_id RHSA-2026:10108
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:10108
5
reference_url https://access.redhat.com/errata/RHSA-2026:6153
reference_id RHSA-2026:6153
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6153
6
reference_url https://access.redhat.com/errata/RHSA-2026:6632
reference_id RHSA-2026:6632
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6632
7
reference_url https://access.redhat.com/errata/RHSA-2026:8342
reference_id RHSA-2026:8342
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8342
8
reference_url https://access.redhat.com/errata/RHSA-2026:9112
reference_id RHSA-2026:9112
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9112
9
reference_url https://access.redhat.com/errata/RHSA-2026:9512
reference_id RHSA-2026:9512
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9512
10
reference_url https://access.redhat.com/errata/RHSA-2026:9644
reference_id RHSA-2026:9644
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9644
fixed_packages
aliases CVE-2026-23171
risk_score 3.1
exploitability 0.5
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-u6nn-wr8u-qqdj
9
url VCID-vsyg-x46t-ayhz
vulnerability_id VCID-vsyg-x46t-ayhz
summary kernel: net/sched: cls_u32: use skb_header_pointer_careful()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-23204.json
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-23204.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-23204
reference_id
reference_type
scores
0
value 0.00015
scoring_system epss
scoring_elements 0.03329
published_at 2026-04-02T12:55:00Z
1
value 0.00015
scoring_system epss
scoring_elements 0.0334
published_at 2026-04-04T12:55:00Z
2
value 0.00015
scoring_system epss
scoring_elements 0.03348
published_at 2026-04-07T12:55:00Z
3
value 0.00015
scoring_system epss
scoring_elements 0.03353
published_at 2026-04-08T12:55:00Z
4
value 0.00015
scoring_system epss
scoring_elements 0.03373
published_at 2026-04-09T12:55:00Z
5
value 0.00015
scoring_system epss
scoring_elements 0.03334
published_at 2026-04-11T12:55:00Z
6
value 0.00015
scoring_system epss
scoring_elements 0.0326
published_at 2026-04-16T12:55:00Z
7
value 0.00015
scoring_system epss
scoring_elements 0.03269
published_at 2026-04-18T12:55:00Z
8
value 0.00015
scoring_system epss
scoring_elements 0.03388
published_at 2026-04-21T12:55:00Z
9
value 0.00015
scoring_system epss
scoring_elements 0.03305
published_at 2026-04-12T12:55:00Z
10
value 0.00015
scoring_system epss
scoring_elements 0.03283
published_at 2026-04-13T12:55:00Z
11
value 0.00018
scoring_system epss
scoring_elements 0.04664
published_at 2026-04-26T12:55:00Z
12
value 0.00018
scoring_system epss
scoring_elements 0.0463
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-23204
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23204
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23204
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2439931
reference_id 2439931
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2439931
5
reference_url https://access.redhat.com/errata/RHSA-2026:10108
reference_id RHSA-2026:10108
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:10108
6
reference_url https://access.redhat.com/errata/RHSA-2026:6036
reference_id RHSA-2026:6036
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6036
7
reference_url https://access.redhat.com/errata/RHSA-2026:6037
reference_id RHSA-2026:6037
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6037
8
reference_url https://access.redhat.com/errata/RHSA-2026:6153
reference_id RHSA-2026:6153
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6153
9
reference_url https://access.redhat.com/errata/RHSA-2026:6632
reference_id RHSA-2026:6632
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6632
10
reference_url https://access.redhat.com/errata/RHSA-2026:8342
reference_id RHSA-2026:8342
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8342
11
reference_url https://access.redhat.com/errata/RHSA-2026:9112
reference_id RHSA-2026:9112
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9112
12
reference_url https://access.redhat.com/errata/RHSA-2026:9512
reference_id RHSA-2026:9512
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9512
13
reference_url https://access.redhat.com/errata/RHSA-2026:9513
reference_id RHSA-2026:9513
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9513
14
reference_url https://access.redhat.com/errata/RHSA-2026:9514
reference_id RHSA-2026:9514
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9514
15
reference_url https://access.redhat.com/errata/RHSA-2026:9515
reference_id RHSA-2026:9515
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9515
16
reference_url https://access.redhat.com/errata/RHSA-2026:9643
reference_id RHSA-2026:9643
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9643
17
reference_url https://access.redhat.com/errata/RHSA-2026:9644
reference_id RHSA-2026:9644
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9644
18
reference_url https://access.redhat.com/errata/RHSA-2026:9835
reference_id RHSA-2026:9835
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9835
19
reference_url https://access.redhat.com/errata/RHSA-2026:9836
reference_id RHSA-2026:9836
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9836
20
reference_url https://access.redhat.com/errata/RHSA-2026:9870
reference_id RHSA-2026:9870
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9870
fixed_packages
aliases CVE-2026-23204
risk_score 3.3
exploitability 0.5
weighted_severity 6.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vsyg-x46t-ayhz
10
url VCID-xkg2-9n6y-5kan
vulnerability_id VCID-xkg2-9n6y-5kan
summary kernel: Linux kernel: Denial of Service due to a deadlock in hugetlb folio migration
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-23097.json
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-23097.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-23097
reference_id
reference_type
scores
0
value 0.00015
scoring_system epss
scoring_elements 0.03203
published_at 2026-04-02T12:55:00Z
1
value 0.00015
scoring_system epss
scoring_elements 0.03212
published_at 2026-04-04T12:55:00Z
2
value 0.00015
scoring_system epss
scoring_elements 0.03215
published_at 2026-04-07T12:55:00Z
3
value 0.00015
scoring_system epss
scoring_elements 0.0322
published_at 2026-04-08T12:55:00Z
4
value 0.00015
scoring_system epss
scoring_elements 0.03244
published_at 2026-04-09T12:55:00Z
5
value 0.00015
scoring_system epss
scoring_elements 0.03198
published_at 2026-04-11T12:55:00Z
6
value 0.00015
scoring_system epss
scoring_elements 0.03171
published_at 2026-04-12T12:55:00Z
7
value 0.00018
scoring_system epss
scoring_elements 0.0452
published_at 2026-04-26T12:55:00Z
8
value 0.00018
scoring_system epss
scoring_elements 0.04364
published_at 2026-04-13T12:55:00Z
9
value 0.00018
scoring_system epss
scoring_elements 0.04332
published_at 2026-04-16T12:55:00Z
10
value 0.00018
scoring_system epss
scoring_elements 0.0434
published_at 2026-04-18T12:55:00Z
11
value 0.00018
scoring_system epss
scoring_elements 0.04472
published_at 2026-04-21T12:55:00Z
12
value 0.00018
scoring_system epss
scoring_elements 0.04497
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-23097
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23097
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23097
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2436802
reference_id 2436802
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2436802
5
reference_url https://access.redhat.com/errata/RHSA-2026:10108
reference_id RHSA-2026:10108
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:10108
6
reference_url https://access.redhat.com/errata/RHSA-2026:3463
reference_id RHSA-2026:3463
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3463
7
reference_url https://access.redhat.com/errata/RHSA-2026:3464
reference_id RHSA-2026:3464
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3464
8
reference_url https://access.redhat.com/errata/RHSA-2026:3488
reference_id RHSA-2026:3488
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3488
9
reference_url https://access.redhat.com/errata/RHSA-2026:4012
reference_id RHSA-2026:4012
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4012
10
reference_url https://usn.ubuntu.com/8162-1/
reference_id USN-8162-1
reference_type
scores
url https://usn.ubuntu.com/8162-1/
11
reference_url https://usn.ubuntu.com/8180-1/
reference_id USN-8180-1
reference_type
scores
url https://usn.ubuntu.com/8180-1/
12
reference_url https://usn.ubuntu.com/8180-2/
reference_id USN-8180-2
reference_type
scores
url https://usn.ubuntu.com/8180-2/
13
reference_url https://usn.ubuntu.com/8180-3/
reference_id USN-8180-3
reference_type
scores
url https://usn.ubuntu.com/8180-3/
14
reference_url https://usn.ubuntu.com/8180-4/
reference_id USN-8180-4
reference_type
scores
url https://usn.ubuntu.com/8180-4/
15
reference_url https://usn.ubuntu.com/8180-5/
reference_id USN-8180-5
reference_type
scores
url https://usn.ubuntu.com/8180-5/
16
reference_url https://usn.ubuntu.com/8186-1/
reference_id USN-8186-1
reference_type
scores
url https://usn.ubuntu.com/8186-1/
17
reference_url https://usn.ubuntu.com/8187-1/
reference_id USN-8187-1
reference_type
scores
url https://usn.ubuntu.com/8187-1/
18
reference_url https://usn.ubuntu.com/8188-1/
reference_id USN-8188-1
reference_type
scores
url https://usn.ubuntu.com/8188-1/
fixed_packages
aliases CVE-2026-23097
risk_score 3.3
exploitability 0.5
weighted_severity 6.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xkg2-9n6y-5kan
Fixing_vulnerabilities
Risk_score3.5
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@5.14.0-427.121.1%3Farch=el9_4