Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/kernel-rt@4.18.0-305.134.1.rt7.210?arch=el8_4
Typerpm
Namespaceredhat
Namekernel-rt
Version4.18.0-305.134.1.rt7.210
Qualifiers
arch el8_4
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-cavt-1v84-uqgt
vulnerability_id VCID-cavt-1v84-uqgt
summary kernel: GSM multiplexing race condition leads to privilege escalation
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6546.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6546.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-6546
reference_id
reference_type
scores
0
value 0.00328
scoring_system epss
scoring_elements 0.55796
published_at 2026-04-02T12:55:00Z
1
value 0.00328
scoring_system epss
scoring_elements 0.55818
published_at 2026-04-04T12:55:00Z
2
value 0.00328
scoring_system epss
scoring_elements 0.55798
published_at 2026-04-07T12:55:00Z
3
value 0.00328
scoring_system epss
scoring_elements 0.55849
published_at 2026-04-08T12:55:00Z
4
value 0.00328
scoring_system epss
scoring_elements 0.55852
published_at 2026-04-09T12:55:00Z
5
value 0.00328
scoring_system epss
scoring_elements 0.55861
published_at 2026-04-11T12:55:00Z
6
value 0.00328
scoring_system epss
scoring_elements 0.55841
published_at 2026-04-12T12:55:00Z
7
value 0.00328
scoring_system epss
scoring_elements 0.55822
published_at 2026-04-13T12:55:00Z
8
value 0.00328
scoring_system epss
scoring_elements 0.55859
published_at 2026-04-16T12:55:00Z
9
value 0.00328
scoring_system epss
scoring_elements 0.55862
published_at 2026-04-18T12:55:00Z
10
value 0.00337
scoring_system epss
scoring_elements 0.56525
published_at 2026-04-29T12:55:00Z
11
value 0.00337
scoring_system epss
scoring_elements 0.56589
published_at 2026-04-21T12:55:00Z
12
value 0.00337
scoring_system epss
scoring_elements 0.56524
published_at 2026-04-24T12:55:00Z
13
value 0.00337
scoring_system epss
scoring_elements 0.56543
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-6546
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6546
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6546
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2255498
reference_id 2255498
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2255498
5
reference_url https://access.redhat.com/errata/RHSA-2024:0930
reference_id RHSA-2024:0930
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0930
6
reference_url https://access.redhat.com/errata/RHSA-2024:0937
reference_id RHSA-2024:0937
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0937
7
reference_url https://access.redhat.com/errata/RHSA-2024:1018
reference_id RHSA-2024:1018
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1018
8
reference_url https://access.redhat.com/errata/RHSA-2024:1019
reference_id RHSA-2024:1019
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1019
9
reference_url https://access.redhat.com/errata/RHSA-2024:1055
reference_id RHSA-2024:1055
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1055
10
reference_url https://access.redhat.com/errata/RHSA-2024:1250
reference_id RHSA-2024:1250
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1250
11
reference_url https://access.redhat.com/errata/RHSA-2024:1253
reference_id RHSA-2024:1253
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1253
12
reference_url https://access.redhat.com/errata/RHSA-2024:1306
reference_id RHSA-2024:1306
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1306
13
reference_url https://access.redhat.com/errata/RHSA-2024:1607
reference_id RHSA-2024:1607
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1607
14
reference_url https://access.redhat.com/errata/RHSA-2024:1612
reference_id RHSA-2024:1612
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1612
15
reference_url https://access.redhat.com/errata/RHSA-2024:1614
reference_id RHSA-2024:1614
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1614
16
reference_url https://access.redhat.com/errata/RHSA-2024:2093
reference_id RHSA-2024:2093
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2093
17
reference_url https://access.redhat.com/errata/RHSA-2024:2394
reference_id RHSA-2024:2394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2394
18
reference_url https://access.redhat.com/errata/RHSA-2024:2621
reference_id RHSA-2024:2621
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2621
19
reference_url https://access.redhat.com/errata/RHSA-2024:2697
reference_id RHSA-2024:2697
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2697
20
reference_url https://access.redhat.com/errata/RHSA-2024:4577
reference_id RHSA-2024:4577
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4577
21
reference_url https://access.redhat.com/errata/RHSA-2024:4729
reference_id RHSA-2024:4729
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4729
22
reference_url https://access.redhat.com/errata/RHSA-2024:4731
reference_id RHSA-2024:4731
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4731
23
reference_url https://access.redhat.com/errata/RHSA-2024:4970
reference_id RHSA-2024:4970
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4970
fixed_packages
aliases CVE-2023-6546
risk_score 3.1
exploitability 0.5
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cavt-1v84-uqgt
1
url VCID-z5cz-xkzn-fbb6
vulnerability_id VCID-z5cz-xkzn-fbb6
summary kernel: dmaengine/idxd: hardware erratum allows potential security problem with direct access by untrusted application
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21823.json
reference_id
reference_type
scores
0
value 6.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21823.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-21823
reference_id
reference_type
scores
0
value 0.00058
scoring_system epss
scoring_elements 0.17928
published_at 2026-04-29T12:55:00Z
1
value 0.00058
scoring_system epss
scoring_elements 0.1818
published_at 2026-04-09T12:55:00Z
2
value 0.00058
scoring_system epss
scoring_elements 0.18187
published_at 2026-04-11T12:55:00Z
3
value 0.00058
scoring_system epss
scoring_elements 0.18139
published_at 2026-04-12T12:55:00Z
4
value 0.00058
scoring_system epss
scoring_elements 0.1809
published_at 2026-04-13T12:55:00Z
5
value 0.00058
scoring_system epss
scoring_elements 0.18033
published_at 2026-04-16T12:55:00Z
6
value 0.00058
scoring_system epss
scoring_elements 0.18045
published_at 2026-04-18T12:55:00Z
7
value 0.00058
scoring_system epss
scoring_elements 0.18079
published_at 2026-04-21T12:55:00Z
8
value 0.00058
scoring_system epss
scoring_elements 0.17988
published_at 2026-04-24T12:55:00Z
9
value 0.00058
scoring_system epss
scoring_elements 0.17965
published_at 2026-04-26T12:55:00Z
10
value 0.00058
scoring_system epss
scoring_elements 0.18287
published_at 2026-04-02T12:55:00Z
11
value 0.00058
scoring_system epss
scoring_elements 0.18338
published_at 2026-04-04T12:55:00Z
12
value 0.00058
scoring_system epss
scoring_elements 0.18041
published_at 2026-04-07T12:55:00Z
13
value 0.00058
scoring_system epss
scoring_elements 0.18124
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-21823
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21823
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21823
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url http://www.openwall.com/lists/oss-security/2024/05/15/1
reference_id 1
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-23T18:02:56Z/
url http://www.openwall.com/lists/oss-security/2024/05/15/1
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2278989
reference_id 2278989
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2278989
6
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DW2MIOIMOFUSNLHLRYX23AFR36BMKD65/
reference_id DW2MIOIMOFUSNLHLRYX23AFR36BMKD65
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-23T18:02:56Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DW2MIOIMOFUSNLHLRYX23AFR36BMKD65/
7
reference_url https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01084.html
reference_id intel-sa-01084.html
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-23T18:02:56Z/
url https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01084.html
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OTB4HWU2PTVW5NEYHHLOCXDKG3PYA534/
reference_id OTB4HWU2PTVW5NEYHHLOCXDKG3PYA534
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-23T18:02:56Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OTB4HWU2PTVW5NEYHHLOCXDKG3PYA534/
9
reference_url https://access.redhat.com/errata/RHSA-2024:4729
reference_id RHSA-2024:4729
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4729
10
reference_url https://access.redhat.com/errata/RHSA-2024:4731
reference_id RHSA-2024:4731
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4731
11
reference_url https://access.redhat.com/errata/RHSA-2024:5101
reference_id RHSA-2024:5101
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5101
12
reference_url https://access.redhat.com/errata/RHSA-2024:5102
reference_id RHSA-2024:5102
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5102
13
reference_url https://access.redhat.com/errata/RHSA-2024:5256
reference_id RHSA-2024:5256
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5256
14
reference_url https://access.redhat.com/errata/RHSA-2024:5257
reference_id RHSA-2024:5257
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5257
15
reference_url https://access.redhat.com/errata/RHSA-2024:5281
reference_id RHSA-2024:5281
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5281
16
reference_url https://access.redhat.com/errata/RHSA-2024:5363
reference_id RHSA-2024:5363
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5363
17
reference_url https://access.redhat.com/errata/RHSA-2024:5364
reference_id RHSA-2024:5364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5364
18
reference_url https://access.redhat.com/errata/RHSA-2024:5365
reference_id RHSA-2024:5365
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5365
19
reference_url https://access.redhat.com/errata/RHSA-2024:6206
reference_id RHSA-2024:6206
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6206
20
reference_url https://usn.ubuntu.com/6816-1/
reference_id USN-6816-1
reference_type
scores
url https://usn.ubuntu.com/6816-1/
21
reference_url https://usn.ubuntu.com/6818-1/
reference_id USN-6818-1
reference_type
scores
url https://usn.ubuntu.com/6818-1/
22
reference_url https://usn.ubuntu.com/6818-2/
reference_id USN-6818-2
reference_type
scores
url https://usn.ubuntu.com/6818-2/
23
reference_url https://usn.ubuntu.com/6818-3/
reference_id USN-6818-3
reference_type
scores
url https://usn.ubuntu.com/6818-3/
24
reference_url https://usn.ubuntu.com/6818-4/
reference_id USN-6818-4
reference_type
scores
url https://usn.ubuntu.com/6818-4/
25
reference_url https://usn.ubuntu.com/6820-1/
reference_id USN-6820-1
reference_type
scores
url https://usn.ubuntu.com/6820-1/
26
reference_url https://usn.ubuntu.com/6820-2/
reference_id USN-6820-2
reference_type
scores
url https://usn.ubuntu.com/6820-2/
27
reference_url https://usn.ubuntu.com/6864-1/
reference_id USN-6864-1
reference_type
scores
url https://usn.ubuntu.com/6864-1/
28
reference_url https://usn.ubuntu.com/6864-2/
reference_id USN-6864-2
reference_type
scores
url https://usn.ubuntu.com/6864-2/
29
reference_url https://usn.ubuntu.com/6864-3/
reference_id USN-6864-3
reference_type
scores
url https://usn.ubuntu.com/6864-3/
30
reference_url https://usn.ubuntu.com/6870-1/
reference_id USN-6870-1
reference_type
scores
url https://usn.ubuntu.com/6870-1/
31
reference_url https://usn.ubuntu.com/6870-2/
reference_id USN-6870-2
reference_type
scores
url https://usn.ubuntu.com/6870-2/
32
reference_url https://usn.ubuntu.com/6871-1/
reference_id USN-6871-1
reference_type
scores
url https://usn.ubuntu.com/6871-1/
33
reference_url https://usn.ubuntu.com/6873-1/
reference_id USN-6873-1
reference_type
scores
url https://usn.ubuntu.com/6873-1/
34
reference_url https://usn.ubuntu.com/6873-2/
reference_id USN-6873-2
reference_type
scores
url https://usn.ubuntu.com/6873-2/
35
reference_url https://usn.ubuntu.com/6874-1/
reference_id USN-6874-1
reference_type
scores
url https://usn.ubuntu.com/6874-1/
36
reference_url https://usn.ubuntu.com/6875-1/
reference_id USN-6875-1
reference_type
scores
url https://usn.ubuntu.com/6875-1/
37
reference_url https://usn.ubuntu.com/6878-1/
reference_id USN-6878-1
reference_type
scores
url https://usn.ubuntu.com/6878-1/
38
reference_url https://usn.ubuntu.com/6892-1/
reference_id USN-6892-1
reference_type
scores
url https://usn.ubuntu.com/6892-1/
39
reference_url https://usn.ubuntu.com/6919-1/
reference_id USN-6919-1
reference_type
scores
url https://usn.ubuntu.com/6919-1/
fixed_packages
aliases CVE-2024-21823
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-z5cz-xkzn-fbb6
Fixing_vulnerabilities
Risk_score3.4
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel-rt@4.18.0-305.134.1.rt7.210%3Farch=el8_4