Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/kernel-rt@5.14.0-284.69.1.rt14.354?arch=el9_2
Typerpm
Namespaceredhat
Namekernel-rt
Version5.14.0-284.69.1.rt14.354
Qualifiers
arch el9_2
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-d6th-8p9s-j7h7
vulnerability_id VCID-d6th-8p9s-j7h7
summary kernel: net/mlx5e: fix a potential double-free in fs_any_create_groups
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-52667.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-52667.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-52667
reference_id
reference_type
scores
0
value 0.0013
scoring_system epss
scoring_elements 0.32639
published_at 2026-04-02T12:55:00Z
1
value 0.0013
scoring_system epss
scoring_elements 0.32208
published_at 2026-04-26T12:55:00Z
2
value 0.0013
scoring_system epss
scoring_elements 0.32535
published_at 2026-04-12T12:55:00Z
3
value 0.0013
scoring_system epss
scoring_elements 0.32506
published_at 2026-04-13T12:55:00Z
4
value 0.0013
scoring_system epss
scoring_elements 0.32541
published_at 2026-04-16T12:55:00Z
5
value 0.0013
scoring_system epss
scoring_elements 0.3252
published_at 2026-04-18T12:55:00Z
6
value 0.0013
scoring_system epss
scoring_elements 0.32488
published_at 2026-04-21T12:55:00Z
7
value 0.0013
scoring_system epss
scoring_elements 0.32324
published_at 2026-04-24T12:55:00Z
8
value 0.0013
scoring_system epss
scoring_elements 0.32674
published_at 2026-04-04T12:55:00Z
9
value 0.0013
scoring_system epss
scoring_elements 0.32496
published_at 2026-04-07T12:55:00Z
10
value 0.0013
scoring_system epss
scoring_elements 0.32543
published_at 2026-04-08T12:55:00Z
11
value 0.0013
scoring_system epss
scoring_elements 0.32569
published_at 2026-04-09T12:55:00Z
12
value 0.0013
scoring_system epss
scoring_elements 0.32571
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-52667
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2281350
reference_id 2281350
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2281350
4
reference_url https://git.kernel.org/stable/c/2897c981ee63e1be5e530b1042484626a10b26d8
reference_id 2897c981ee63e1be5e530b1042484626a10b26d8
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T15:42:12Z/
url https://git.kernel.org/stable/c/2897c981ee63e1be5e530b1042484626a10b26d8
5
reference_url https://git.kernel.org/stable/c/65a4ade8a6d205979292e88beeb6a626ddbd4779
reference_id 65a4ade8a6d205979292e88beeb6a626ddbd4779
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T15:42:12Z/
url https://git.kernel.org/stable/c/65a4ade8a6d205979292e88beeb6a626ddbd4779
6
reference_url https://git.kernel.org/stable/c/72a729868592752b5a294d27453da264106983b1
reference_id 72a729868592752b5a294d27453da264106983b1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T15:42:12Z/
url https://git.kernel.org/stable/c/72a729868592752b5a294d27453da264106983b1
7
reference_url https://git.kernel.org/stable/c/aef855df7e1bbd5aa4484851561211500b22707e
reference_id aef855df7e1bbd5aa4484851561211500b22707e
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T15:42:12Z/
url https://git.kernel.org/stable/c/aef855df7e1bbd5aa4484851561211500b22707e
8
reference_url https://git.kernel.org/stable/c/b2fa86b2aceb4bc9ada51cea90f61546d7512cbe
reference_id b2fa86b2aceb4bc9ada51cea90f61546d7512cbe
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T15:42:12Z/
url https://git.kernel.org/stable/c/b2fa86b2aceb4bc9ada51cea90f61546d7512cbe
9
reference_url https://access.redhat.com/errata/RHSA-2024:3854
reference_id RHSA-2024:3854
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3854
10
reference_url https://access.redhat.com/errata/RHSA-2024:3855
reference_id RHSA-2024:3855
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3855
11
reference_url https://access.redhat.com/errata/RHSA-2024:4211
reference_id RHSA-2024:4211
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4211
12
reference_url https://access.redhat.com/errata/RHSA-2024:4349
reference_id RHSA-2024:4349
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4349
13
reference_url https://access.redhat.com/errata/RHSA-2024:4352
reference_id RHSA-2024:4352
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4352
14
reference_url https://access.redhat.com/errata/RHSA-2024:4740
reference_id RHSA-2024:4740
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4740
15
reference_url https://access.redhat.com/errata/RHSA-2024:4902
reference_id RHSA-2024:4902
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4902
16
reference_url https://usn.ubuntu.com/6818-1/
reference_id USN-6818-1
reference_type
scores
url https://usn.ubuntu.com/6818-1/
17
reference_url https://usn.ubuntu.com/6818-2/
reference_id USN-6818-2
reference_type
scores
url https://usn.ubuntu.com/6818-2/
18
reference_url https://usn.ubuntu.com/6818-3/
reference_id USN-6818-3
reference_type
scores
url https://usn.ubuntu.com/6818-3/
19
reference_url https://usn.ubuntu.com/6818-4/
reference_id USN-6818-4
reference_type
scores
url https://usn.ubuntu.com/6818-4/
20
reference_url https://usn.ubuntu.com/6819-1/
reference_id USN-6819-1
reference_type
scores
url https://usn.ubuntu.com/6819-1/
21
reference_url https://usn.ubuntu.com/6819-2/
reference_id USN-6819-2
reference_type
scores
url https://usn.ubuntu.com/6819-2/
22
reference_url https://usn.ubuntu.com/6819-3/
reference_id USN-6819-3
reference_type
scores
url https://usn.ubuntu.com/6819-3/
23
reference_url https://usn.ubuntu.com/6819-4/
reference_id USN-6819-4
reference_type
scores
url https://usn.ubuntu.com/6819-4/
fixed_packages
aliases CVE-2023-52667
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-d6th-8p9s-j7h7
1
url VCID-j9ud-q26e-4qbk
vulnerability_id VCID-j9ud-q26e-4qbk
summary kernel: kvm: Avoid potential UAF in LPI translation cache
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-26598.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-26598.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-26598
reference_id
reference_type
scores
0
value 0.00014
scoring_system epss
scoring_elements 0.02661
published_at 2026-04-26T12:55:00Z
1
value 0.00014
scoring_system epss
scoring_elements 0.02568
published_at 2026-04-02T12:55:00Z
2
value 0.00014
scoring_system epss
scoring_elements 0.02582
published_at 2026-04-12T12:55:00Z
3
value 0.00014
scoring_system epss
scoring_elements 0.02586
published_at 2026-04-07T12:55:00Z
4
value 0.00014
scoring_system epss
scoring_elements 0.02591
published_at 2026-04-08T12:55:00Z
5
value 0.00014
scoring_system epss
scoring_elements 0.02611
published_at 2026-04-09T12:55:00Z
6
value 0.00014
scoring_system epss
scoring_elements 0.02594
published_at 2026-04-11T12:55:00Z
7
value 0.00014
scoring_system epss
scoring_elements 0.0258
published_at 2026-04-13T12:55:00Z
8
value 0.00014
scoring_system epss
scoring_elements 0.02565
published_at 2026-04-16T12:55:00Z
9
value 0.00014
scoring_system epss
scoring_elements 0.02573
published_at 2026-04-18T12:55:00Z
10
value 0.00014
scoring_system epss
scoring_elements 0.02684
published_at 2026-04-21T12:55:00Z
11
value 0.00014
scoring_system epss
scoring_elements 0.02672
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-26598
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26598
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26598
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://git.kernel.org/stable/c/12c2759ab1343c124ed46ba48f27bd1ef5d2dff4
reference_id 12c2759ab1343c124ed46ba48f27bd1ef5d2dff4
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T16:15:47Z/
url https://git.kernel.org/stable/c/12c2759ab1343c124ed46ba48f27bd1ef5d2dff4
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2265801
reference_id 2265801
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2265801
6
reference_url https://git.kernel.org/stable/c/65b201bf3e9af1b0254243a5881390eda56f72d1
reference_id 65b201bf3e9af1b0254243a5881390eda56f72d1
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T16:15:47Z/
url https://git.kernel.org/stable/c/65b201bf3e9af1b0254243a5881390eda56f72d1
7
reference_url https://git.kernel.org/stable/c/ad362fe07fecf0aba839ff2cc59a3617bd42c33f
reference_id ad362fe07fecf0aba839ff2cc59a3617bd42c33f
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T16:15:47Z/
url https://git.kernel.org/stable/c/ad362fe07fecf0aba839ff2cc59a3617bd42c33f
8
reference_url https://git.kernel.org/stable/c/ba7be666740847d967822bed15500656b26bc703
reference_id ba7be666740847d967822bed15500656b26bc703
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T16:15:47Z/
url https://git.kernel.org/stable/c/ba7be666740847d967822bed15500656b26bc703
9
reference_url https://git.kernel.org/stable/c/d04acadb6490aa3314f9c9e087691e55de153b88
reference_id d04acadb6490aa3314f9c9e087691e55de153b88
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T16:15:47Z/
url https://git.kernel.org/stable/c/d04acadb6490aa3314f9c9e087691e55de153b88
10
reference_url https://git.kernel.org/stable/c/dba788e25f05209adf2b0175eb1691dc89fb1ba6
reference_id dba788e25f05209adf2b0175eb1691dc89fb1ba6
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T16:15:47Z/
url https://git.kernel.org/stable/c/dba788e25f05209adf2b0175eb1691dc89fb1ba6
11
reference_url https://git.kernel.org/stable/c/dd3956a1b3dd11f46488c928cb890d6937d1ca80
reference_id dd3956a1b3dd11f46488c928cb890d6937d1ca80
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T16:15:47Z/
url https://git.kernel.org/stable/c/dd3956a1b3dd11f46488c928cb890d6937d1ca80
12
reference_url https://access.redhat.com/errata/RHSA-2024:3854
reference_id RHSA-2024:3854
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3854
13
reference_url https://access.redhat.com/errata/RHSA-2024:3855
reference_id RHSA-2024:3855
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3855
14
reference_url https://access.redhat.com/errata/RHSA-2024:4415
reference_id RHSA-2024:4415
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4415
15
reference_url https://access.redhat.com/errata/RHSA-2024:4740
reference_id RHSA-2024:4740
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4740
16
reference_url https://access.redhat.com/errata/RHSA-2024:8161
reference_id RHSA-2024:8161
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8161
17
reference_url https://usn.ubuntu.com/6688-1/
reference_id USN-6688-1
reference_type
scores
url https://usn.ubuntu.com/6688-1/
18
reference_url https://usn.ubuntu.com/6725-1/
reference_id USN-6725-1
reference_type
scores
url https://usn.ubuntu.com/6725-1/
19
reference_url https://usn.ubuntu.com/6725-2/
reference_id USN-6725-2
reference_type
scores
url https://usn.ubuntu.com/6725-2/
20
reference_url https://usn.ubuntu.com/6767-1/
reference_id USN-6767-1
reference_type
scores
url https://usn.ubuntu.com/6767-1/
21
reference_url https://usn.ubuntu.com/6767-2/
reference_id USN-6767-2
reference_type
scores
url https://usn.ubuntu.com/6767-2/
22
reference_url https://usn.ubuntu.com/6818-1/
reference_id USN-6818-1
reference_type
scores
url https://usn.ubuntu.com/6818-1/
23
reference_url https://usn.ubuntu.com/6818-2/
reference_id USN-6818-2
reference_type
scores
url https://usn.ubuntu.com/6818-2/
24
reference_url https://usn.ubuntu.com/6818-3/
reference_id USN-6818-3
reference_type
scores
url https://usn.ubuntu.com/6818-3/
25
reference_url https://usn.ubuntu.com/6818-4/
reference_id USN-6818-4
reference_type
scores
url https://usn.ubuntu.com/6818-4/
26
reference_url https://usn.ubuntu.com/6819-1/
reference_id USN-6819-1
reference_type
scores
url https://usn.ubuntu.com/6819-1/
27
reference_url https://usn.ubuntu.com/6819-2/
reference_id USN-6819-2
reference_type
scores
url https://usn.ubuntu.com/6819-2/
28
reference_url https://usn.ubuntu.com/6819-3/
reference_id USN-6819-3
reference_type
scores
url https://usn.ubuntu.com/6819-3/
29
reference_url https://usn.ubuntu.com/6819-4/
reference_id USN-6819-4
reference_type
scores
url https://usn.ubuntu.com/6819-4/
fixed_packages
aliases CVE-2024-26598
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-j9ud-q26e-4qbk
2
url VCID-n1w6-27yz-dfer
vulnerability_id VCID-n1w6-27yz-dfer
summary kernel: bluetooth: bt_sock_ioctl race condition leads to use-after-free in bt_sock_recvmsg
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-51779.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-51779.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-51779
reference_id
reference_type
scores
0
value 0.00102
scoring_system epss
scoring_elements 0.28149
published_at 2026-04-02T12:55:00Z
1
value 0.00102
scoring_system epss
scoring_elements 0.28056
published_at 2026-04-08T12:55:00Z
2
value 0.00102
scoring_system epss
scoring_elements 0.28192
published_at 2026-04-04T12:55:00Z
3
value 0.00102
scoring_system epss
scoring_elements 0.27988
published_at 2026-04-07T12:55:00Z
4
value 0.00102
scoring_system epss
scoring_elements 0.28098
published_at 2026-04-09T12:55:00Z
5
value 0.00102
scoring_system epss
scoring_elements 0.28105
published_at 2026-04-11T12:55:00Z
6
value 0.00102
scoring_system epss
scoring_elements 0.28062
published_at 2026-04-12T12:55:00Z
7
value 0.00102
scoring_system epss
scoring_elements 0.28004
published_at 2026-04-13T12:55:00Z
8
value 0.00126
scoring_system epss
scoring_elements 0.31893
published_at 2026-04-18T12:55:00Z
9
value 0.00126
scoring_system epss
scoring_elements 0.31866
published_at 2026-04-21T12:55:00Z
10
value 0.00126
scoring_system epss
scoring_elements 0.31914
published_at 2026-04-16T12:55:00Z
11
value 0.0013
scoring_system epss
scoring_elements 0.32099
published_at 2026-04-26T12:55:00Z
12
value 0.0013
scoring_system epss
scoring_elements 0.3222
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-51779
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51779
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51779
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2256822
reference_id 2256822
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2256822
5
reference_url https://github.com/torvalds/linux/commit/2e07e8348ea454615e268222ae3fc240421be768
reference_id 2e07e8348ea454615e268222ae3fc240421be768
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-05T17:06:18Z/
url https://github.com/torvalds/linux/commit/2e07e8348ea454615e268222ae3fc240421be768
6
reference_url https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html
reference_id msg00016.html
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-05T17:06:18Z/
url https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html
7
reference_url https://access.redhat.com/errata/RHSA-2024:10941
reference_id RHSA-2024:10941
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10941
8
reference_url https://access.redhat.com/errata/RHSA-2024:2394
reference_id RHSA-2024:2394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2394
9
reference_url https://access.redhat.com/errata/RHSA-2024:2950
reference_id RHSA-2024:2950
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2950
10
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3138
11
reference_url https://access.redhat.com/errata/RHSA-2024:3854
reference_id RHSA-2024:3854
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3854
12
reference_url https://access.redhat.com/errata/RHSA-2024:3855
reference_id RHSA-2024:3855
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3855
13
reference_url https://access.redhat.com/errata/RHSA-2024:3859
reference_id RHSA-2024:3859
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3859
14
reference_url https://usn.ubuntu.com/6606-1/
reference_id USN-6606-1
reference_type
scores
url https://usn.ubuntu.com/6606-1/
15
reference_url https://usn.ubuntu.com/6680-1/
reference_id USN-6680-1
reference_type
scores
url https://usn.ubuntu.com/6680-1/
16
reference_url https://usn.ubuntu.com/6680-2/
reference_id USN-6680-2
reference_type
scores
url https://usn.ubuntu.com/6680-2/
17
reference_url https://usn.ubuntu.com/6680-3/
reference_id USN-6680-3
reference_type
scores
url https://usn.ubuntu.com/6680-3/
18
reference_url https://usn.ubuntu.com/6681-1/
reference_id USN-6681-1
reference_type
scores
url https://usn.ubuntu.com/6681-1/
19
reference_url https://usn.ubuntu.com/6681-2/
reference_id USN-6681-2
reference_type
scores
url https://usn.ubuntu.com/6681-2/
20
reference_url https://usn.ubuntu.com/6681-3/
reference_id USN-6681-3
reference_type
scores
url https://usn.ubuntu.com/6681-3/
21
reference_url https://usn.ubuntu.com/6681-4/
reference_id USN-6681-4
reference_type
scores
url https://usn.ubuntu.com/6681-4/
22
reference_url https://usn.ubuntu.com/6686-1/
reference_id USN-6686-1
reference_type
scores
url https://usn.ubuntu.com/6686-1/
23
reference_url https://usn.ubuntu.com/6686-2/
reference_id USN-6686-2
reference_type
scores
url https://usn.ubuntu.com/6686-2/
24
reference_url https://usn.ubuntu.com/6686-3/
reference_id USN-6686-3
reference_type
scores
url https://usn.ubuntu.com/6686-3/
25
reference_url https://usn.ubuntu.com/6686-4/
reference_id USN-6686-4
reference_type
scores
url https://usn.ubuntu.com/6686-4/
26
reference_url https://usn.ubuntu.com/6686-5/
reference_id USN-6686-5
reference_type
scores
url https://usn.ubuntu.com/6686-5/
27
reference_url https://usn.ubuntu.com/6705-1/
reference_id USN-6705-1
reference_type
scores
url https://usn.ubuntu.com/6705-1/
28
reference_url https://usn.ubuntu.com/6716-1/
reference_id USN-6716-1
reference_type
scores
url https://usn.ubuntu.com/6716-1/
29
reference_url https://usn.ubuntu.com/6739-1/
reference_id USN-6739-1
reference_type
scores
url https://usn.ubuntu.com/6739-1/
30
reference_url https://usn.ubuntu.com/6740-1/
reference_id USN-6740-1
reference_type
scores
url https://usn.ubuntu.com/6740-1/
fixed_packages
aliases CVE-2023-51779
risk_score 3.1
exploitability 0.5
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-n1w6-27yz-dfer
3
url VCID-z5c6-dfvg-dyhm
vulnerability_id VCID-z5c6-dfvg-dyhm
summary kernel: KVM: SVM: improper check in svm_set_x2apic_msr_interception allows direct access to host x2apic msrs
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5090.json
reference_id
reference_type
scores
0
value 6.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5090.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-5090
reference_id
reference_type
scores
0
value 0.00039
scoring_system epss
scoring_elements 0.11611
published_at 2026-04-26T12:55:00Z
1
value 0.00039
scoring_system epss
scoring_elements 0.11568
published_at 2026-04-18T12:55:00Z
2
value 0.00039
scoring_system epss
scoring_elements 0.11692
published_at 2026-04-21T12:55:00Z
3
value 0.00039
scoring_system epss
scoring_elements 0.11651
published_at 2026-04-24T12:55:00Z
4
value 0.00039
scoring_system epss
scoring_elements 0.11617
published_at 2026-04-07T12:55:00Z
5
value 0.00039
scoring_system epss
scoring_elements 0.11702
published_at 2026-04-08T12:55:00Z
6
value 0.00039
scoring_system epss
scoring_elements 0.11757
published_at 2026-04-09T12:55:00Z
7
value 0.00039
scoring_system epss
scoring_elements 0.11768
published_at 2026-04-11T12:55:00Z
8
value 0.00039
scoring_system epss
scoring_elements 0.1173
published_at 2026-04-12T12:55:00Z
9
value 0.00039
scoring_system epss
scoring_elements 0.11705
published_at 2026-04-13T12:55:00Z
10
value 0.00039
scoring_system epss
scoring_elements 0.11567
published_at 2026-04-16T12:55:00Z
11
value 0.0004
scoring_system epss
scoring_elements 0.12366
published_at 2026-04-02T12:55:00Z
12
value 0.0004
scoring_system epss
scoring_elements 0.12411
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-5090
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2248122
reference_id 2248122
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2248122
4
reference_url https://access.redhat.com/errata/RHSA-2024:2758
reference_id RHSA-2024:2758
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2758
5
reference_url https://access.redhat.com/errata/RHSA-2024:3854
reference_id RHSA-2024:3854
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3854
6
reference_url https://access.redhat.com/errata/RHSA-2024:3855
reference_id RHSA-2024:3855
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3855
7
reference_url https://access.redhat.com/errata/RHSA-2024:4211
reference_id RHSA-2024:4211
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4211
8
reference_url https://access.redhat.com/errata/RHSA-2024:4352
reference_id RHSA-2024:4352
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4352
9
reference_url https://usn.ubuntu.com/6497-1/
reference_id USN-6497-1
reference_type
scores
url https://usn.ubuntu.com/6497-1/
10
reference_url https://usn.ubuntu.com/6502-1/
reference_id USN-6502-1
reference_type
scores
url https://usn.ubuntu.com/6502-1/
11
reference_url https://usn.ubuntu.com/6502-2/
reference_id USN-6502-2
reference_type
scores
url https://usn.ubuntu.com/6502-2/
12
reference_url https://usn.ubuntu.com/6502-3/
reference_id USN-6502-3
reference_type
scores
url https://usn.ubuntu.com/6502-3/
13
reference_url https://usn.ubuntu.com/6502-4/
reference_id USN-6502-4
reference_type
scores
url https://usn.ubuntu.com/6502-4/
14
reference_url https://usn.ubuntu.com/6503-1/
reference_id USN-6503-1
reference_type
scores
url https://usn.ubuntu.com/6503-1/
15
reference_url https://usn.ubuntu.com/6520-1/
reference_id USN-6520-1
reference_type
scores
url https://usn.ubuntu.com/6520-1/
16
reference_url https://usn.ubuntu.com/6537-1/
reference_id USN-6537-1
reference_type
scores
url https://usn.ubuntu.com/6537-1/
17
reference_url https://usn.ubuntu.com/6572-1/
reference_id USN-6572-1
reference_type
scores
url https://usn.ubuntu.com/6572-1/
fixed_packages
aliases CVE-2023-5090
risk_score 2.7
exploitability 0.5
weighted_severity 5.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-z5c6-dfvg-dyhm
Fixing_vulnerabilities
Risk_score3.5
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel-rt@5.14.0-284.69.1.rt14.354%3Farch=el9_2