Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/kernel@5.14.0-284.55.1?arch=el9_2
Typerpm
Namespaceredhat
Namekernel
Version5.14.0-284.55.1
Qualifiers
arch el9_2
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-1p3k-f3ck-83bg
vulnerability_id VCID-1p3k-f3ck-83bg
summary kernel: Use-after-free in nft_verdict_dump due to a race between set GC and transaction
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4244.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4244.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-4244
reference_id
reference_type
scores
0
value 0.00018
scoring_system epss
scoring_elements 0.04334
published_at 2026-04-02T12:55:00Z
1
value 0.00018
scoring_system epss
scoring_elements 0.04356
published_at 2026-04-18T12:55:00Z
2
value 0.00018
scoring_system epss
scoring_elements 0.04367
published_at 2026-04-07T12:55:00Z
3
value 0.00018
scoring_system epss
scoring_elements 0.044
published_at 2026-04-08T12:55:00Z
4
value 0.00018
scoring_system epss
scoring_elements 0.04417
published_at 2026-04-09T12:55:00Z
5
value 0.00018
scoring_system epss
scoring_elements 0.04411
published_at 2026-04-11T12:55:00Z
6
value 0.00018
scoring_system epss
scoring_elements 0.04396
published_at 2026-04-12T12:55:00Z
7
value 0.00018
scoring_system epss
scoring_elements 0.0438
published_at 2026-04-13T12:55:00Z
8
value 0.00018
scoring_system epss
scoring_elements 0.04347
published_at 2026-04-16T12:55:00Z
9
value 0.00018
scoring_system epss
scoring_elements 0.04487
published_at 2026-04-21T12:55:00Z
10
value 0.00018
scoring_system epss
scoring_elements 0.04513
published_at 2026-04-24T12:55:00Z
11
value 0.00018
scoring_system epss
scoring_elements 0.04534
published_at 2026-04-26T12:55:00Z
12
value 0.00018
scoring_system epss
scoring_elements 0.04577
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-4244
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4244
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4244
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2235306
reference_id 2235306
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2235306
5
reference_url https://access.redhat.com/errata/RHSA-2024:1018
reference_id RHSA-2024:1018
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1018
6
reference_url https://access.redhat.com/errata/RHSA-2024:1019
reference_id RHSA-2024:1019
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1019
7
reference_url https://access.redhat.com/errata/RHSA-2024:1248
reference_id RHSA-2024:1248
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1248
8
reference_url https://access.redhat.com/errata/RHSA-2024:2094
reference_id RHSA-2024:2094
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2094
9
reference_url https://access.redhat.com/errata/RHSA-2024:2950
reference_id RHSA-2024:2950
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2950
10
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3138
11
reference_url https://access.redhat.com/errata/RHSA-2024:3414
reference_id RHSA-2024:3414
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3414
12
reference_url https://access.redhat.com/errata/RHSA-2024:3421
reference_id RHSA-2024:3421
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3421
13
reference_url https://usn.ubuntu.com/6444-1/
reference_id USN-6444-1
reference_type
scores
url https://usn.ubuntu.com/6444-1/
14
reference_url https://usn.ubuntu.com/6444-2/
reference_id USN-6444-2
reference_type
scores
url https://usn.ubuntu.com/6444-2/
15
reference_url https://usn.ubuntu.com/6445-1/
reference_id USN-6445-1
reference_type
scores
url https://usn.ubuntu.com/6445-1/
16
reference_url https://usn.ubuntu.com/6445-2/
reference_id USN-6445-2
reference_type
scores
url https://usn.ubuntu.com/6445-2/
17
reference_url https://usn.ubuntu.com/6446-1/
reference_id USN-6446-1
reference_type
scores
url https://usn.ubuntu.com/6446-1/
18
reference_url https://usn.ubuntu.com/6446-2/
reference_id USN-6446-2
reference_type
scores
url https://usn.ubuntu.com/6446-2/
19
reference_url https://usn.ubuntu.com/6446-3/
reference_id USN-6446-3
reference_type
scores
url https://usn.ubuntu.com/6446-3/
20
reference_url https://usn.ubuntu.com/6461-1/
reference_id USN-6461-1
reference_type
scores
url https://usn.ubuntu.com/6461-1/
21
reference_url https://usn.ubuntu.com/6466-1/
reference_id USN-6466-1
reference_type
scores
url https://usn.ubuntu.com/6466-1/
22
reference_url https://usn.ubuntu.com/6503-1/
reference_id USN-6503-1
reference_type
scores
url https://usn.ubuntu.com/6503-1/
23
reference_url https://usn.ubuntu.com/6537-1/
reference_id USN-6537-1
reference_type
scores
url https://usn.ubuntu.com/6537-1/
24
reference_url https://usn.ubuntu.com/6572-1/
reference_id USN-6572-1
reference_type
scores
url https://usn.ubuntu.com/6572-1/
25
reference_url https://usn.ubuntu.com/6681-1/
reference_id USN-6681-1
reference_type
scores
url https://usn.ubuntu.com/6681-1/
26
reference_url https://usn.ubuntu.com/6681-2/
reference_id USN-6681-2
reference_type
scores
url https://usn.ubuntu.com/6681-2/
27
reference_url https://usn.ubuntu.com/6681-3/
reference_id USN-6681-3
reference_type
scores
url https://usn.ubuntu.com/6681-3/
28
reference_url https://usn.ubuntu.com/6681-4/
reference_id USN-6681-4
reference_type
scores
url https://usn.ubuntu.com/6681-4/
29
reference_url https://usn.ubuntu.com/6716-1/
reference_id USN-6716-1
reference_type
scores
url https://usn.ubuntu.com/6716-1/
fixed_packages
aliases CVE-2023-4244
risk_score 3.1
exploitability 0.5
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1p3k-f3ck-83bg
1
url VCID-5yqp-43hw-cuhu
vulnerability_id VCID-5yqp-43hw-cuhu
summary kernel: vmwgfx: NULL pointer dereference in vmw_cmd_dx_define_query
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-38096.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-38096.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-38096
reference_id
reference_type
scores
0
value 0.00036
scoring_system epss
scoring_elements 0.10604
published_at 2026-04-09T12:55:00Z
1
value 0.00036
scoring_system epss
scoring_elements 0.10463
published_at 2026-04-07T12:55:00Z
2
value 0.00036
scoring_system epss
scoring_elements 0.10537
published_at 2026-04-08T12:55:00Z
3
value 0.00036
scoring_system epss
scoring_elements 0.10633
published_at 2026-04-11T12:55:00Z
4
value 0.00036
scoring_system epss
scoring_elements 0.106
published_at 2026-04-12T12:55:00Z
5
value 0.00036
scoring_system epss
scoring_elements 0.10576
published_at 2026-04-13T12:55:00Z
6
value 0.00036
scoring_system epss
scoring_elements 0.10445
published_at 2026-04-16T12:55:00Z
7
value 0.00036
scoring_system epss
scoring_elements 0.10427
published_at 2026-04-18T12:55:00Z
8
value 0.00037
scoring_system epss
scoring_elements 0.10851
published_at 2026-04-26T12:55:00Z
9
value 0.00037
scoring_system epss
scoring_elements 0.10793
published_at 2026-04-29T12:55:00Z
10
value 0.00037
scoring_system epss
scoring_elements 0.10937
published_at 2026-04-21T12:55:00Z
11
value 0.00037
scoring_system epss
scoring_elements 0.10977
published_at 2026-04-02T12:55:00Z
12
value 0.00037
scoring_system epss
scoring_elements 0.11039
published_at 2026-04-04T12:55:00Z
13
value 0.00037
scoring_system epss
scoring_elements 0.10892
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-38096
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38096
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38096
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2133452
reference_id 2133452
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2133452
5
reference_url https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
reference_id msg00017.html
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-26T13:45:25Z/
url https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
6
reference_url https://access.redhat.com/errata/RHSA-2024:0930
reference_id RHSA-2024:0930
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0930
7
reference_url https://access.redhat.com/errata/RHSA-2024:1018
reference_id RHSA-2024:1018
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1018
8
reference_url https://access.redhat.com/errata/RHSA-2024:1019
reference_id RHSA-2024:1019
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1019
9
reference_url https://access.redhat.com/errata/RHSA-2024:1250
reference_id RHSA-2024:1250
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1250
10
reference_url https://access.redhat.com/errata/RHSA-2024:1268
reference_id RHSA-2024:1268
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1268
11
reference_url https://access.redhat.com/errata/RHSA-2024:1269
reference_id RHSA-2024:1269
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1269
12
reference_url https://access.redhat.com/errata/RHSA-2024:1306
reference_id RHSA-2024:1306
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1306
13
reference_url https://access.redhat.com/errata/RHSA-2024:1367
reference_id RHSA-2024:1367
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1367
14
reference_url https://access.redhat.com/errata/RHSA-2024:1382
reference_id RHSA-2024:1382
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1382
15
reference_url https://access.redhat.com/errata/RHSA-2024:1404
reference_id RHSA-2024:1404
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1404
16
reference_url https://access.redhat.com/errata/RHSA-2024:1607
reference_id RHSA-2024:1607
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1607
17
reference_url https://access.redhat.com/errata/RHSA-2024:1614
reference_id RHSA-2024:1614
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1614
18
reference_url https://access.redhat.com/errata/RHSA-2024:2093
reference_id RHSA-2024:2093
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2093
19
reference_url https://access.redhat.com/errata/RHSA-2024:2394
reference_id RHSA-2024:2394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2394
20
reference_url https://bugzilla.openanolis.cn/show_bug.cgi?id=2073
reference_id show_bug.cgi?id=2073
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-26T13:45:25Z/
url https://bugzilla.openanolis.cn/show_bug.cgi?id=2073
21
reference_url https://usn.ubuntu.com/6816-1/
reference_id USN-6816-1
reference_type
scores
url https://usn.ubuntu.com/6816-1/
22
reference_url https://usn.ubuntu.com/6817-1/
reference_id USN-6817-1
reference_type
scores
url https://usn.ubuntu.com/6817-1/
23
reference_url https://usn.ubuntu.com/6817-2/
reference_id USN-6817-2
reference_type
scores
url https://usn.ubuntu.com/6817-2/
24
reference_url https://usn.ubuntu.com/6817-3/
reference_id USN-6817-3
reference_type
scores
url https://usn.ubuntu.com/6817-3/
25
reference_url https://usn.ubuntu.com/6878-1/
reference_id USN-6878-1
reference_type
scores
url https://usn.ubuntu.com/6878-1/
26
reference_url https://usn.ubuntu.com/6898-1/
reference_id USN-6898-1
reference_type
scores
url https://usn.ubuntu.com/6898-1/
27
reference_url https://usn.ubuntu.com/6898-2/
reference_id USN-6898-2
reference_type
scores
url https://usn.ubuntu.com/6898-2/
28
reference_url https://usn.ubuntu.com/6898-3/
reference_id USN-6898-3
reference_type
scores
url https://usn.ubuntu.com/6898-3/
29
reference_url https://usn.ubuntu.com/6898-4/
reference_id USN-6898-4
reference_type
scores
url https://usn.ubuntu.com/6898-4/
30
reference_url https://usn.ubuntu.com/6917-1/
reference_id USN-6917-1
reference_type
scores
url https://usn.ubuntu.com/6917-1/
31
reference_url https://usn.ubuntu.com/6919-1/
reference_id USN-6919-1
reference_type
scores
url https://usn.ubuntu.com/6919-1/
32
reference_url https://usn.ubuntu.com/6927-1/
reference_id USN-6927-1
reference_type
scores
url https://usn.ubuntu.com/6927-1/
33
reference_url https://usn.ubuntu.com/7019-1/
reference_id USN-7019-1
reference_type
scores
url https://usn.ubuntu.com/7019-1/
34
reference_url https://usn.ubuntu.com/7173-1/
reference_id USN-7173-1
reference_type
scores
url https://usn.ubuntu.com/7173-1/
35
reference_url https://usn.ubuntu.com/7173-2/
reference_id USN-7173-2
reference_type
scores
url https://usn.ubuntu.com/7173-2/
36
reference_url https://usn.ubuntu.com/7173-3/
reference_id USN-7173-3
reference_type
scores
url https://usn.ubuntu.com/7173-3/
37
reference_url https://usn.ubuntu.com/7195-1/
reference_id USN-7195-1
reference_type
scores
url https://usn.ubuntu.com/7195-1/
38
reference_url https://usn.ubuntu.com/7195-2/
reference_id USN-7195-2
reference_type
scores
url https://usn.ubuntu.com/7195-2/
39
reference_url https://usn.ubuntu.com/7413-1/
reference_id USN-7413-1
reference_type
scores
url https://usn.ubuntu.com/7413-1/
fixed_packages
aliases CVE-2022-38096
risk_score 2.9
exploitability 0.5
weighted_severity 5.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5yqp-43hw-cuhu
2
url VCID-5zmf-5v9v-k3h1
vulnerability_id VCID-5zmf-5v9v-k3h1
summary kernel: use-after-free in amdgpu_cs_wait_all_fences in drivers/gpu/drm/amd/amdgpu/amdgpu_cs.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-51042.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-51042.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-51042
reference_id
reference_type
scores
0
value 0.00032
scoring_system epss
scoring_elements 0.0907
published_at 2026-04-02T12:55:00Z
1
value 0.00032
scoring_system epss
scoring_elements 0.09122
published_at 2026-04-08T12:55:00Z
2
value 0.00032
scoring_system epss
scoring_elements 0.0912
published_at 2026-04-12T12:55:00Z
3
value 0.00032
scoring_system epss
scoring_elements 0.09105
published_at 2026-04-13T12:55:00Z
4
value 0.00032
scoring_system epss
scoring_elements 0.09001
published_at 2026-04-16T12:55:00Z
5
value 0.00032
scoring_system epss
scoring_elements 0.0898
published_at 2026-04-18T12:55:00Z
6
value 0.00032
scoring_system epss
scoring_elements 0.09136
published_at 2026-04-21T12:55:00Z
7
value 0.00032
scoring_system epss
scoring_elements 0.09179
published_at 2026-04-24T12:55:00Z
8
value 0.00032
scoring_system epss
scoring_elements 0.09123
published_at 2026-04-26T12:55:00Z
9
value 0.00032
scoring_system epss
scoring_elements 0.09042
published_at 2026-04-07T12:55:00Z
10
value 0.00032
scoring_system epss
scoring_elements 0.09151
published_at 2026-04-09T12:55:00Z
11
value 0.00032
scoring_system epss
scoring_elements 0.09153
published_at 2026-04-11T12:55:00Z
12
value 0.00035
scoring_system epss
scoring_elements 0.10153
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-51042
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51042
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51042
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2259866
reference_id 2259866
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2259866
5
reference_url https://github.com/torvalds/linux/commit/2e54154b9f27262efd0cb4f903cc7d5ad1fe9628
reference_id 2e54154b9f27262efd0cb4f903cc7d5ad1fe9628
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-10T04:00:10Z/
url https://github.com/torvalds/linux/commit/2e54154b9f27262efd0cb4f903cc7d5ad1fe9628
6
reference_url https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.4.12
reference_id ChangeLog-6.4.12
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-10T04:00:10Z/
url https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.4.12
7
reference_url https://access.redhat.com/errata/RHSA-2024:0930
reference_id RHSA-2024:0930
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0930
8
reference_url https://access.redhat.com/errata/RHSA-2024:1018
reference_id RHSA-2024:1018
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1018
9
reference_url https://access.redhat.com/errata/RHSA-2024:1019
reference_id RHSA-2024:1019
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1019
10
reference_url https://access.redhat.com/errata/RHSA-2024:1248
reference_id RHSA-2024:1248
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1248
11
reference_url https://access.redhat.com/errata/RHSA-2024:1404
reference_id RHSA-2024:1404
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1404
12
reference_url https://access.redhat.com/errata/RHSA-2024:1607
reference_id RHSA-2024:1607
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1607
13
reference_url https://access.redhat.com/errata/RHSA-2024:1614
reference_id RHSA-2024:1614
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1614
14
reference_url https://access.redhat.com/errata/RHSA-2024:2093
reference_id RHSA-2024:2093
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2093
15
reference_url https://access.redhat.com/errata/RHSA-2024:2094
reference_id RHSA-2024:2094
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2094
fixed_packages
aliases CVE-2023-51042
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5zmf-5v9v-k3h1
3
url VCID-cavt-1v84-uqgt
vulnerability_id VCID-cavt-1v84-uqgt
summary kernel: GSM multiplexing race condition leads to privilege escalation
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6546.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6546.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-6546
reference_id
reference_type
scores
0
value 0.00328
scoring_system epss
scoring_elements 0.55796
published_at 2026-04-02T12:55:00Z
1
value 0.00328
scoring_system epss
scoring_elements 0.55818
published_at 2026-04-04T12:55:00Z
2
value 0.00328
scoring_system epss
scoring_elements 0.55798
published_at 2026-04-07T12:55:00Z
3
value 0.00328
scoring_system epss
scoring_elements 0.55849
published_at 2026-04-08T12:55:00Z
4
value 0.00328
scoring_system epss
scoring_elements 0.55852
published_at 2026-04-09T12:55:00Z
5
value 0.00328
scoring_system epss
scoring_elements 0.55861
published_at 2026-04-11T12:55:00Z
6
value 0.00328
scoring_system epss
scoring_elements 0.55841
published_at 2026-04-12T12:55:00Z
7
value 0.00328
scoring_system epss
scoring_elements 0.55822
published_at 2026-04-13T12:55:00Z
8
value 0.00328
scoring_system epss
scoring_elements 0.55859
published_at 2026-04-16T12:55:00Z
9
value 0.00328
scoring_system epss
scoring_elements 0.55862
published_at 2026-04-18T12:55:00Z
10
value 0.00337
scoring_system epss
scoring_elements 0.56525
published_at 2026-04-29T12:55:00Z
11
value 0.00337
scoring_system epss
scoring_elements 0.56589
published_at 2026-04-21T12:55:00Z
12
value 0.00337
scoring_system epss
scoring_elements 0.56524
published_at 2026-04-24T12:55:00Z
13
value 0.00337
scoring_system epss
scoring_elements 0.56543
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-6546
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6546
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6546
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2255498
reference_id 2255498
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2255498
5
reference_url https://access.redhat.com/errata/RHSA-2024:0930
reference_id RHSA-2024:0930
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0930
6
reference_url https://access.redhat.com/errata/RHSA-2024:0937
reference_id RHSA-2024:0937
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0937
7
reference_url https://access.redhat.com/errata/RHSA-2024:1018
reference_id RHSA-2024:1018
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1018
8
reference_url https://access.redhat.com/errata/RHSA-2024:1019
reference_id RHSA-2024:1019
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1019
9
reference_url https://access.redhat.com/errata/RHSA-2024:1055
reference_id RHSA-2024:1055
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1055
10
reference_url https://access.redhat.com/errata/RHSA-2024:1250
reference_id RHSA-2024:1250
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1250
11
reference_url https://access.redhat.com/errata/RHSA-2024:1253
reference_id RHSA-2024:1253
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1253
12
reference_url https://access.redhat.com/errata/RHSA-2024:1306
reference_id RHSA-2024:1306
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1306
13
reference_url https://access.redhat.com/errata/RHSA-2024:1607
reference_id RHSA-2024:1607
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1607
14
reference_url https://access.redhat.com/errata/RHSA-2024:1612
reference_id RHSA-2024:1612
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1612
15
reference_url https://access.redhat.com/errata/RHSA-2024:1614
reference_id RHSA-2024:1614
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1614
16
reference_url https://access.redhat.com/errata/RHSA-2024:2093
reference_id RHSA-2024:2093
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2093
17
reference_url https://access.redhat.com/errata/RHSA-2024:2394
reference_id RHSA-2024:2394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2394
18
reference_url https://access.redhat.com/errata/RHSA-2024:2621
reference_id RHSA-2024:2621
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2621
19
reference_url https://access.redhat.com/errata/RHSA-2024:2697
reference_id RHSA-2024:2697
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2697
20
reference_url https://access.redhat.com/errata/RHSA-2024:4577
reference_id RHSA-2024:4577
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4577
21
reference_url https://access.redhat.com/errata/RHSA-2024:4729
reference_id RHSA-2024:4729
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4729
22
reference_url https://access.redhat.com/errata/RHSA-2024:4731
reference_id RHSA-2024:4731
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4731
23
reference_url https://access.redhat.com/errata/RHSA-2024:4970
reference_id RHSA-2024:4970
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4970
fixed_packages
aliases CVE-2023-6546
risk_score 3.1
exploitability 0.5
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cavt-1v84-uqgt
4
url VCID-g6yc-cmf7-kbhf
vulnerability_id VCID-g6yc-cmf7-kbhf
summary kernel: use-after-free during a race condition between a nonblocking atomic commit and a driver unload in drivers/gpu/drm/drm_atomic.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-51043.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-51043.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-51043
reference_id
reference_type
scores
0
value 0.00014
scoring_system epss
scoring_elements 0.02372
published_at 2026-04-02T12:55:00Z
1
value 0.00014
scoring_system epss
scoring_elements 0.02493
published_at 2026-04-29T12:55:00Z
2
value 0.00014
scoring_system epss
scoring_elements 0.02354
published_at 2026-04-16T12:55:00Z
3
value 0.00014
scoring_system epss
scoring_elements 0.02359
published_at 2026-04-18T12:55:00Z
4
value 0.00014
scoring_system epss
scoring_elements 0.02458
published_at 2026-04-21T12:55:00Z
5
value 0.00014
scoring_system epss
scoring_elements 0.02446
published_at 2026-04-24T12:55:00Z
6
value 0.00014
scoring_system epss
scoring_elements 0.02434
published_at 2026-04-26T12:55:00Z
7
value 0.00014
scoring_system epss
scoring_elements 0.02383
published_at 2026-04-04T12:55:00Z
8
value 0.00014
scoring_system epss
scoring_elements 0.0238
published_at 2026-04-07T12:55:00Z
9
value 0.00014
scoring_system epss
scoring_elements 0.02385
published_at 2026-04-08T12:55:00Z
10
value 0.00014
scoring_system epss
scoring_elements 0.02405
published_at 2026-04-09T12:55:00Z
11
value 0.00014
scoring_system epss
scoring_elements 0.02382
published_at 2026-04-11T12:55:00Z
12
value 0.00014
scoring_system epss
scoring_elements 0.0237
published_at 2026-04-12T12:55:00Z
13
value 0.00014
scoring_system epss
scoring_elements 0.02369
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-51043
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51043
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51043
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2260005
reference_id 2260005
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2260005
5
reference_url https://github.com/torvalds/linux/commit/4e076c73e4f6e90816b30fcd4a0d7ab365087255
reference_id 4e076c73e4f6e90816b30fcd4a0d7ab365087255
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-29T13:47:31Z/
url https://github.com/torvalds/linux/commit/4e076c73e4f6e90816b30fcd4a0d7ab365087255
6
reference_url https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.4.5
reference_id ChangeLog-6.4.5
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-29T13:47:31Z/
url https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.4.5
7
reference_url https://access.redhat.com/errata/RHSA-2023:7077
reference_id RHSA-2023:7077
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7077
8
reference_url https://access.redhat.com/errata/RHSA-2024:1018
reference_id RHSA-2024:1018
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1018
9
reference_url https://access.redhat.com/errata/RHSA-2024:1019
reference_id RHSA-2024:1019
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1019
10
reference_url https://access.redhat.com/errata/RHSA-2024:1188
reference_id RHSA-2024:1188
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1188
11
reference_url https://access.redhat.com/errata/RHSA-2024:1404
reference_id RHSA-2024:1404
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1404
12
reference_url https://access.redhat.com/errata/RHSA-2024:2394
reference_id RHSA-2024:2394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2394
13
reference_url https://usn.ubuntu.com/6739-1/
reference_id USN-6739-1
reference_type
scores
url https://usn.ubuntu.com/6739-1/
14
reference_url https://usn.ubuntu.com/6740-1/
reference_id USN-6740-1
reference_type
scores
url https://usn.ubuntu.com/6740-1/
fixed_packages
aliases CVE-2023-51043
risk_score 3.1
exploitability 0.5
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-g6yc-cmf7-kbhf
5
url VCID-pp43-v99a-k3cz
vulnerability_id VCID-pp43-v99a-k3cz
summary kernel: netfilter: use-after-free in nft_trans_gc_catchall_sync leads to privilege escalation
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0193.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0193.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-0193
reference_id
reference_type
scores
0
value 0.0009
scoring_system epss
scoring_elements 0.25267
published_at 2026-04-29T12:55:00Z
1
value 0.0009
scoring_system epss
scoring_elements 0.25398
published_at 2026-04-16T12:55:00Z
2
value 0.0009
scoring_system epss
scoring_elements 0.25388
published_at 2026-04-18T12:55:00Z
3
value 0.0009
scoring_system epss
scoring_elements 0.25358
published_at 2026-04-21T12:55:00Z
4
value 0.0009
scoring_system epss
scoring_elements 0.2532
published_at 2026-04-24T12:55:00Z
5
value 0.0009
scoring_system epss
scoring_elements 0.25313
published_at 2026-04-26T12:55:00Z
6
value 0.00113
scoring_system epss
scoring_elements 0.29919
published_at 2026-04-08T12:55:00Z
7
value 0.00113
scoring_system epss
scoring_elements 0.29955
published_at 2026-04-09T12:55:00Z
8
value 0.00113
scoring_system epss
scoring_elements 0.2996
published_at 2026-04-11T12:55:00Z
9
value 0.00113
scoring_system epss
scoring_elements 0.29913
published_at 2026-04-12T12:55:00Z
10
value 0.00113
scoring_system epss
scoring_elements 0.29864
published_at 2026-04-13T12:55:00Z
11
value 0.00113
scoring_system epss
scoring_elements 0.29995
published_at 2026-04-02T12:55:00Z
12
value 0.00113
scoring_system epss
scoring_elements 0.30043
published_at 2026-04-04T12:55:00Z
13
value 0.00113
scoring_system epss
scoring_elements 0.29857
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-0193
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0193
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0193
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2255653
reference_id 2255653
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-07-02T13:17:27Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2255653
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
reference_id cpe:/a:redhat:enterprise_linux:9::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::nfv
reference_id cpe:/a:redhat:enterprise_linux:9::nfv
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::nfv
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::realtime
reference_id cpe:/a:redhat:enterprise_linux:9::realtime
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::realtime
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:logging:5.8::el9
reference_id cpe:/a:redhat:logging:5.8::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:logging:5.8::el9
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::nfv
reference_id cpe:/a:redhat:rhel_e4s:9.0::nfv
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::nfv
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::realtime
reference_id cpe:/a:redhat:rhel_e4s:9.0::realtime
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::realtime
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
reference_id cpe:/a:redhat:rhel_eus:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::crb
reference_id cpe:/a:redhat:rhel_eus:9.2::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::crb
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::nfv
reference_id cpe:/a:redhat:rhel_eus:9.2::nfv
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::nfv
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::realtime
reference_id cpe:/a:redhat:rhel_eus:9.2::realtime
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::realtime
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
reference_id cpe:/o:redhat:enterprise_linux:9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
reference_id cpe:/o:redhat:enterprise_linux:9::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:9.0::baseos
reference_id cpe:/o:redhat:rhel_e4s:9.0::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:9.0::baseos
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.2::baseos
reference_id cpe:/o:redhat:rhel_eus:9.2::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.2::baseos
24
reference_url https://access.redhat.com/security/cve/CVE-2024-0193
reference_id CVE-2024-0193
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-07-02T13:17:27Z/
url https://access.redhat.com/security/cve/CVE-2024-0193
25
reference_url https://access.redhat.com/errata/RHSA-2024:1018
reference_id RHSA-2024:1018
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-07-02T13:17:27Z/
url https://access.redhat.com/errata/RHSA-2024:1018
26
reference_url https://access.redhat.com/errata/RHSA-2024:1019
reference_id RHSA-2024:1019
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-07-02T13:17:27Z/
url https://access.redhat.com/errata/RHSA-2024:1019
27
reference_url https://access.redhat.com/errata/RHSA-2024:1248
reference_id RHSA-2024:1248
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-07-02T13:17:27Z/
url https://access.redhat.com/errata/RHSA-2024:1248
28
reference_url https://access.redhat.com/errata/RHSA-2024:2094
reference_id RHSA-2024:2094
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-07-02T13:17:27Z/
url https://access.redhat.com/errata/RHSA-2024:2094
29
reference_url https://access.redhat.com/errata/RHSA-2024:4412
reference_id RHSA-2024:4412
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-07-02T13:17:27Z/
url https://access.redhat.com/errata/RHSA-2024:4412
30
reference_url https://access.redhat.com/errata/RHSA-2024:4415
reference_id RHSA-2024:4415
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-07-02T13:17:27Z/
url https://access.redhat.com/errata/RHSA-2024:4415
31
reference_url https://usn.ubuntu.com/6606-1/
reference_id USN-6606-1
reference_type
scores
url https://usn.ubuntu.com/6606-1/
32
reference_url https://usn.ubuntu.com/6607-1/
reference_id USN-6607-1
reference_type
scores
url https://usn.ubuntu.com/6607-1/
33
reference_url https://usn.ubuntu.com/6608-1/
reference_id USN-6608-1
reference_type
scores
url https://usn.ubuntu.com/6608-1/
34
reference_url https://usn.ubuntu.com/6608-2/
reference_id USN-6608-2
reference_type
scores
url https://usn.ubuntu.com/6608-2/
35
reference_url https://usn.ubuntu.com/6609-1/
reference_id USN-6609-1
reference_type
scores
url https://usn.ubuntu.com/6609-1/
36
reference_url https://usn.ubuntu.com/6609-2/
reference_id USN-6609-2
reference_type
scores
url https://usn.ubuntu.com/6609-2/
37
reference_url https://usn.ubuntu.com/6609-3/
reference_id USN-6609-3
reference_type
scores
url https://usn.ubuntu.com/6609-3/
38
reference_url https://usn.ubuntu.com/6628-1/
reference_id USN-6628-1
reference_type
scores
url https://usn.ubuntu.com/6628-1/
39
reference_url https://usn.ubuntu.com/6628-2/
reference_id USN-6628-2
reference_type
scores
url https://usn.ubuntu.com/6628-2/
40
reference_url https://usn.ubuntu.com/6635-1/
reference_id USN-6635-1
reference_type
scores
url https://usn.ubuntu.com/6635-1/
fixed_packages
aliases CVE-2024-0193
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pp43-v99a-k3cz
6
url VCID-qkq7-ws9x-43f7
vulnerability_id VCID-qkq7-ws9x-43f7
summary kernel: nf_tables: use-after-free vulnerability in the nft_verdict_init() function
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-1086.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-1086.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-1086
reference_id
reference_type
scores
0
value 0.85405
scoring_system epss
scoring_elements 0.99364
published_at 2026-04-07T12:55:00Z
1
value 0.85405
scoring_system epss
scoring_elements 0.99365
published_at 2026-04-09T12:55:00Z
2
value 0.85405
scoring_system epss
scoring_elements 0.99366
published_at 2026-04-11T12:55:00Z
3
value 0.85405
scoring_system epss
scoring_elements 0.99367
published_at 2026-04-13T12:55:00Z
4
value 0.85405
scoring_system epss
scoring_elements 0.99369
published_at 2026-04-18T12:55:00Z
5
value 0.85911
scoring_system epss
scoring_elements 0.99383
published_at 2026-04-04T12:55:00Z
6
value 0.86034
scoring_system epss
scoring_elements 0.99397
published_at 2026-04-26T12:55:00Z
7
value 0.86056
scoring_system epss
scoring_elements 0.99389
published_at 2026-04-02T12:55:00Z
8
value 0.86056
scoring_system epss
scoring_elements 0.99399
published_at 2026-04-29T12:55:00Z
9
value 0.86753
scoring_system epss
scoring_elements 0.99429
published_at 2026-04-24T12:55:00Z
10
value 0.86753
scoring_system epss
scoring_elements 0.99427
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-1086
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1086
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1086
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url http://www.openwall.com/lists/oss-security/2024/04/14/1
reference_id 1
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-06-13T14:20:47Z/
url http://www.openwall.com/lists/oss-security/2024/04/14/1
5
reference_url http://www.openwall.com/lists/oss-security/2024/04/15/2
reference_id 2
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-06-13T14:20:47Z/
url http://www.openwall.com/lists/oss-security/2024/04/15/2
6
reference_url http://www.openwall.com/lists/oss-security/2024/04/10/22
reference_id 22
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-06-13T14:20:47Z/
url http://www.openwall.com/lists/oss-security/2024/04/10/22
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2262126
reference_id 2262126
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2262126
8
reference_url http://www.openwall.com/lists/oss-security/2024/04/10/23
reference_id 23
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-06-13T14:20:47Z/
url http://www.openwall.com/lists/oss-security/2024/04/10/23
9
reference_url http://www.openwall.com/lists/oss-security/2024/04/17/5
reference_id 5
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-06-13T14:20:47Z/
url http://www.openwall.com/lists/oss-security/2024/04/17/5
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LSPIOMIJYTLZB6QKPQVVAYSUETUWKPF/
reference_id 7LSPIOMIJYTLZB6QKPQVVAYSUETUWKPF
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-06-13T14:20:47Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LSPIOMIJYTLZB6QKPQVVAYSUETUWKPF/
11
reference_url https://github.com/Notselwyn/CVE-2024-1086
reference_id CVE-2024-1086
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-06-13T14:20:47Z/
url https://github.com/Notselwyn/CVE-2024-1086
12
reference_url https://kernel.dance/f342de4e2f33e0e39165d8639387aa6c19dff660
reference_id f342de4e2f33e0e39165d8639387aa6c19dff660
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-06-13T14:20:47Z/
url https://kernel.dance/f342de4e2f33e0e39165d8639387aa6c19dff660
13
reference_url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f342de4e2f33e0e39165d8639387aa6c19dff660
reference_id ?id=f342de4e2f33e0e39165d8639387aa6c19dff660
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-06-13T14:20:47Z/
url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f342de4e2f33e0e39165d8639387aa6c19dff660
14
reference_url https://news.ycombinator.com/item?id=39828424
reference_id item?id=39828424
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-06-13T14:20:47Z/
url https://news.ycombinator.com/item?id=39828424
15
reference_url https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html
reference_id msg00016.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-06-13T14:20:47Z/
url https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html
16
reference_url https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html
reference_id msg00020.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-06-13T14:20:47Z/
url https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html
17
reference_url https://pwning.tech/nftables/
reference_id nftables
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-06-13T14:20:47Z/
url https://pwning.tech/nftables/
18
reference_url https://security.netapp.com/advisory/ntap-20240614-0009/
reference_id ntap-20240614-0009
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-06-13T14:20:47Z/
url https://security.netapp.com/advisory/ntap-20240614-0009/
19
reference_url https://access.redhat.com/errata/RHSA-2024:0930
reference_id RHSA-2024:0930
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0930
20
reference_url https://access.redhat.com/errata/RHSA-2024:1018
reference_id RHSA-2024:1018
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1018
21
reference_url https://access.redhat.com/errata/RHSA-2024:1019
reference_id RHSA-2024:1019
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1019
22
reference_url https://access.redhat.com/errata/RHSA-2024:1249
reference_id RHSA-2024:1249
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1249
23
reference_url https://access.redhat.com/errata/RHSA-2024:1332
reference_id RHSA-2024:1332
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1332
24
reference_url https://access.redhat.com/errata/RHSA-2024:1404
reference_id RHSA-2024:1404
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1404
25
reference_url https://access.redhat.com/errata/RHSA-2024:1607
reference_id RHSA-2024:1607
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1607
26
reference_url https://access.redhat.com/errata/RHSA-2024:1614
reference_id RHSA-2024:1614
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1614
27
reference_url https://access.redhat.com/errata/RHSA-2024:2093
reference_id RHSA-2024:2093
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2093
28
reference_url https://access.redhat.com/errata/RHSA-2024:2394
reference_id RHSA-2024:2394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2394
29
reference_url https://access.redhat.com/errata/RHSA-2024:2697
reference_id RHSA-2024:2697
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2697
30
reference_url https://access.redhat.com/errata/RHSA-2024:3318
reference_id RHSA-2024:3318
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3318
31
reference_url https://access.redhat.com/errata/RHSA-2024:3319
reference_id RHSA-2024:3319
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3319
32
reference_url https://access.redhat.com/errata/RHSA-2024:3414
reference_id RHSA-2024:3414
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3414
33
reference_url https://access.redhat.com/errata/RHSA-2024:3421
reference_id RHSA-2024:3421
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3421
34
reference_url https://access.redhat.com/errata/RHSA-2024:3427
reference_id RHSA-2024:3427
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3427
35
reference_url https://access.redhat.com/errata/RHSA-2024:3528
reference_id RHSA-2024:3528
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3528
36
reference_url https://access.redhat.com/errata/RHSA-2024:3529
reference_id RHSA-2024:3529
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3529
37
reference_url https://access.redhat.com/errata/RHSA-2024:3530
reference_id RHSA-2024:3530
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3530
38
reference_url https://access.redhat.com/errata/RHSA-2024:3805
reference_id RHSA-2024:3805
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3805
39
reference_url https://access.redhat.com/errata/RHSA-2024:4073
reference_id RHSA-2024:4073
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4073
40
reference_url https://access.redhat.com/errata/RHSA-2024:4074
reference_id RHSA-2024:4074
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4074
41
reference_url https://access.redhat.com/errata/RHSA-2024:4075
reference_id RHSA-2024:4075
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4075
42
reference_url https://usn.ubuntu.com/6688-1/
reference_id USN-6688-1
reference_type
scores
url https://usn.ubuntu.com/6688-1/
43
reference_url https://usn.ubuntu.com/6700-1/
reference_id USN-6700-1
reference_type
scores
url https://usn.ubuntu.com/6700-1/
44
reference_url https://usn.ubuntu.com/6700-2/
reference_id USN-6700-2
reference_type
scores
url https://usn.ubuntu.com/6700-2/
45
reference_url https://usn.ubuntu.com/6701-1/
reference_id USN-6701-1
reference_type
scores
url https://usn.ubuntu.com/6701-1/
46
reference_url https://usn.ubuntu.com/6701-2/
reference_id USN-6701-2
reference_type
scores
url https://usn.ubuntu.com/6701-2/
47
reference_url https://usn.ubuntu.com/6701-3/
reference_id USN-6701-3
reference_type
scores
url https://usn.ubuntu.com/6701-3/
48
reference_url https://usn.ubuntu.com/6701-4/
reference_id USN-6701-4
reference_type
scores
url https://usn.ubuntu.com/6701-4/
49
reference_url https://usn.ubuntu.com/6702-1/
reference_id USN-6702-1
reference_type
scores
url https://usn.ubuntu.com/6702-1/
50
reference_url https://usn.ubuntu.com/6702-2/
reference_id USN-6702-2
reference_type
scores
url https://usn.ubuntu.com/6702-2/
51
reference_url https://usn.ubuntu.com/6704-1/
reference_id USN-6704-1
reference_type
scores
url https://usn.ubuntu.com/6704-1/
52
reference_url https://usn.ubuntu.com/6704-2/
reference_id USN-6704-2
reference_type
scores
url https://usn.ubuntu.com/6704-2/
53
reference_url https://usn.ubuntu.com/6704-3/
reference_id USN-6704-3
reference_type
scores
url https://usn.ubuntu.com/6704-3/
54
reference_url https://usn.ubuntu.com/6704-4/
reference_id USN-6704-4
reference_type
scores
url https://usn.ubuntu.com/6704-4/
55
reference_url https://usn.ubuntu.com/6705-1/
reference_id USN-6705-1
reference_type
scores
url https://usn.ubuntu.com/6705-1/
56
reference_url https://usn.ubuntu.com/6707-1/
reference_id USN-6707-1
reference_type
scores
url https://usn.ubuntu.com/6707-1/
57
reference_url https://usn.ubuntu.com/6707-2/
reference_id USN-6707-2
reference_type
scores
url https://usn.ubuntu.com/6707-2/
58
reference_url https://usn.ubuntu.com/6707-3/
reference_id USN-6707-3
reference_type
scores
url https://usn.ubuntu.com/6707-3/
59
reference_url https://usn.ubuntu.com/6707-4/
reference_id USN-6707-4
reference_type
scores
url https://usn.ubuntu.com/6707-4/
60
reference_url https://usn.ubuntu.com/6716-1/
reference_id USN-6716-1
reference_type
scores
url https://usn.ubuntu.com/6716-1/
fixed_packages
aliases CVE-2024-1086
risk_score 10.0
exploitability 2.0
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qkq7-ws9x-43f7
7
url VCID-raem-h5nr-g7cq
vulnerability_id VCID-raem-h5nr-g7cq
summary kernel: nf_tables: use-after-free vulnerability in the nft_setelem_catchall_deactivate() function
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-1085.json
reference_id
reference_type
scores
0
value 6.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-1085.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-1085
reference_id
reference_type
scores
0
value 0.00046
scoring_system epss
scoring_elements 0.14074
published_at 2026-04-29T12:55:00Z
1
value 0.00046
scoring_system epss
scoring_elements 0.14057
published_at 2026-04-16T12:55:00Z
2
value 0.00046
scoring_system epss
scoring_elements 0.14056
published_at 2026-04-18T12:55:00Z
3
value 0.00046
scoring_system epss
scoring_elements 0.14133
published_at 2026-04-21T12:55:00Z
4
value 0.00046
scoring_system epss
scoring_elements 0.14167
published_at 2026-04-24T12:55:00Z
5
value 0.00046
scoring_system epss
scoring_elements 0.14143
published_at 2026-04-26T12:55:00Z
6
value 0.00046
scoring_system epss
scoring_elements 0.14308
published_at 2026-04-02T12:55:00Z
7
value 0.00046
scoring_system epss
scoring_elements 0.14371
published_at 2026-04-04T12:55:00Z
8
value 0.00046
scoring_system epss
scoring_elements 0.14178
published_at 2026-04-07T12:55:00Z
9
value 0.00046
scoring_system epss
scoring_elements 0.14261
published_at 2026-04-11T12:55:00Z
10
value 0.00046
scoring_system epss
scoring_elements 0.14314
published_at 2026-04-09T12:55:00Z
11
value 0.00046
scoring_system epss
scoring_elements 0.14223
published_at 2026-04-12T12:55:00Z
12
value 0.00046
scoring_system epss
scoring_elements 0.14166
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-1085
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2262127
reference_id 2262127
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2262127
4
reference_url https://kernel.dance/b1db244ffd041a49ecc9618e8feb6b5c1afcdaa7
reference_id b1db244ffd041a49ecc9618e8feb6b5c1afcdaa7
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-08T15:46:32Z/
url https://kernel.dance/b1db244ffd041a49ecc9618e8feb6b5c1afcdaa7
5
reference_url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b1db244ffd041a49ecc9618e8feb6b5c1afcdaa7
reference_id ?id=b1db244ffd041a49ecc9618e8feb6b5c1afcdaa7
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-08T15:46:32Z/
url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b1db244ffd041a49ecc9618e8feb6b5c1afcdaa7
6
reference_url https://access.redhat.com/errata/RHSA-2024:1018
reference_id RHSA-2024:1018
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1018
7
reference_url https://access.redhat.com/errata/RHSA-2024:1019
reference_id RHSA-2024:1019
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1019
8
reference_url https://access.redhat.com/errata/RHSA-2024:2394
reference_id RHSA-2024:2394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2394
9
reference_url https://usn.ubuntu.com/6688-1/
reference_id USN-6688-1
reference_type
scores
url https://usn.ubuntu.com/6688-1/
10
reference_url https://usn.ubuntu.com/6704-1/
reference_id USN-6704-1
reference_type
scores
url https://usn.ubuntu.com/6704-1/
11
reference_url https://usn.ubuntu.com/6704-2/
reference_id USN-6704-2
reference_type
scores
url https://usn.ubuntu.com/6704-2/
12
reference_url https://usn.ubuntu.com/6704-3/
reference_id USN-6704-3
reference_type
scores
url https://usn.ubuntu.com/6704-3/
13
reference_url https://usn.ubuntu.com/6704-4/
reference_id USN-6704-4
reference_type
scores
url https://usn.ubuntu.com/6704-4/
14
reference_url https://usn.ubuntu.com/6705-1/
reference_id USN-6705-1
reference_type
scores
url https://usn.ubuntu.com/6705-1/
15
reference_url https://usn.ubuntu.com/6707-1/
reference_id USN-6707-1
reference_type
scores
url https://usn.ubuntu.com/6707-1/
16
reference_url https://usn.ubuntu.com/6707-2/
reference_id USN-6707-2
reference_type
scores
url https://usn.ubuntu.com/6707-2/
17
reference_url https://usn.ubuntu.com/6707-3/
reference_id USN-6707-3
reference_type
scores
url https://usn.ubuntu.com/6707-3/
18
reference_url https://usn.ubuntu.com/6707-4/
reference_id USN-6707-4
reference_type
scores
url https://usn.ubuntu.com/6707-4/
fixed_packages
aliases CVE-2024-1085
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-raem-h5nr-g7cq
8
url VCID-rbrm-7x37-3ugv
vulnerability_id VCID-rbrm-7x37-3ugv
summary kernel: inactive elements in nft_pipapo_walk
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6817.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6817.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-6817
reference_id
reference_type
scores
0
value 0.00021
scoring_system epss
scoring_elements 0.0549
published_at 2026-04-02T12:55:00Z
1
value 0.00021
scoring_system epss
scoring_elements 0.05524
published_at 2026-04-07T12:55:00Z
2
value 0.00021
scoring_system epss
scoring_elements 0.05561
published_at 2026-04-08T12:55:00Z
3
value 0.00021
scoring_system epss
scoring_elements 0.05585
published_at 2026-04-09T12:55:00Z
4
value 0.00021
scoring_system epss
scoring_elements 0.05558
published_at 2026-04-11T12:55:00Z
5
value 0.00021
scoring_system epss
scoring_elements 0.05545
published_at 2026-04-12T12:55:00Z
6
value 0.00021
scoring_system epss
scoring_elements 0.05537
published_at 2026-04-13T12:55:00Z
7
value 0.00021
scoring_system epss
scoring_elements 0.05488
published_at 2026-04-16T12:55:00Z
8
value 0.00021
scoring_system epss
scoring_elements 0.05498
published_at 2026-04-18T12:55:00Z
9
value 0.00021
scoring_system epss
scoring_elements 0.0566
published_at 2026-04-21T12:55:00Z
10
value 0.00021
scoring_system epss
scoring_elements 0.05695
published_at 2026-04-24T12:55:00Z
11
value 0.00021
scoring_system epss
scoring_elements 0.05732
published_at 2026-04-26T12:55:00Z
12
value 0.00021
scoring_system epss
scoring_elements 0.05738
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-6817
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44879
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44879
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25775
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25775
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34324
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34324
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35827
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35827
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45863
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45863
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46813
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46813
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46862
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46862
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5178
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5178
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51780
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51780
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51781
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51782
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5197
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5197
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5717
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5717
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6121
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6121
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6531
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6531
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6817
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6817
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6931
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6931
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6932
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6932
20
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
21
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2255139
reference_id 2255139
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2255139
22
reference_url https://access.redhat.com/errata/RHSA-2024:0724
reference_id RHSA-2024:0724
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0724
23
reference_url https://access.redhat.com/errata/RHSA-2024:0881
reference_id RHSA-2024:0881
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0881
24
reference_url https://access.redhat.com/errata/RHSA-2024:0897
reference_id RHSA-2024:0897
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0897
25
reference_url https://access.redhat.com/errata/RHSA-2024:1018
reference_id RHSA-2024:1018
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1018
26
reference_url https://access.redhat.com/errata/RHSA-2024:1019
reference_id RHSA-2024:1019
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1019
27
reference_url https://access.redhat.com/errata/RHSA-2024:1248
reference_id RHSA-2024:1248
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1248
28
reference_url https://access.redhat.com/errata/RHSA-2024:1268
reference_id RHSA-2024:1268
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1268
29
reference_url https://access.redhat.com/errata/RHSA-2024:1269
reference_id RHSA-2024:1269
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1269
30
reference_url https://access.redhat.com/errata/RHSA-2024:1367
reference_id RHSA-2024:1367
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1367
31
reference_url https://access.redhat.com/errata/RHSA-2024:1382
reference_id RHSA-2024:1382
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1382
32
reference_url https://access.redhat.com/errata/RHSA-2024:1404
reference_id RHSA-2024:1404
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1404
33
reference_url https://access.redhat.com/errata/RHSA-2024:2094
reference_id RHSA-2024:2094
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2094
34
reference_url https://access.redhat.com/errata/RHSA-2024:3414
reference_id RHSA-2024:3414
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3414
35
reference_url https://access.redhat.com/errata/RHSA-2024:3421
reference_id RHSA-2024:3421
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3421
36
reference_url https://usn.ubuntu.com/6606-1/
reference_id USN-6606-1
reference_type
scores
url https://usn.ubuntu.com/6606-1/
37
reference_url https://usn.ubuntu.com/6607-1/
reference_id USN-6607-1
reference_type
scores
url https://usn.ubuntu.com/6607-1/
38
reference_url https://usn.ubuntu.com/6608-1/
reference_id USN-6608-1
reference_type
scores
url https://usn.ubuntu.com/6608-1/
39
reference_url https://usn.ubuntu.com/6608-2/
reference_id USN-6608-2
reference_type
scores
url https://usn.ubuntu.com/6608-2/
40
reference_url https://usn.ubuntu.com/6609-1/
reference_id USN-6609-1
reference_type
scores
url https://usn.ubuntu.com/6609-1/
41
reference_url https://usn.ubuntu.com/6609-2/
reference_id USN-6609-2
reference_type
scores
url https://usn.ubuntu.com/6609-2/
42
reference_url https://usn.ubuntu.com/6609-3/
reference_id USN-6609-3
reference_type
scores
url https://usn.ubuntu.com/6609-3/
43
reference_url https://usn.ubuntu.com/6628-1/
reference_id USN-6628-1
reference_type
scores
url https://usn.ubuntu.com/6628-1/
44
reference_url https://usn.ubuntu.com/6628-2/
reference_id USN-6628-2
reference_type
scores
url https://usn.ubuntu.com/6628-2/
45
reference_url https://usn.ubuntu.com/6635-1/
reference_id USN-6635-1
reference_type
scores
url https://usn.ubuntu.com/6635-1/
fixed_packages
aliases CVE-2023-6817
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rbrm-7x37-3ugv
9
url VCID-wmdx-p5fr-yqe4
vulnerability_id VCID-wmdx-p5fr-yqe4
summary kernel: Out of boundary write in perf_read_group() as result of overflow a perf_event's read_size
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6931.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6931.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-6931
reference_id
reference_type
scores
0
value 0.00437
scoring_system epss
scoring_elements 0.62987
published_at 2026-04-02T12:55:00Z
1
value 0.00437
scoring_system epss
scoring_elements 0.63016
published_at 2026-04-04T12:55:00Z
2
value 0.00437
scoring_system epss
scoring_elements 0.6298
published_at 2026-04-07T12:55:00Z
3
value 0.00437
scoring_system epss
scoring_elements 0.63031
published_at 2026-04-08T12:55:00Z
4
value 0.00437
scoring_system epss
scoring_elements 0.63047
published_at 2026-04-09T12:55:00Z
5
value 0.00437
scoring_system epss
scoring_elements 0.63064
published_at 2026-04-16T12:55:00Z
6
value 0.00437
scoring_system epss
scoring_elements 0.6305
published_at 2026-04-21T12:55:00Z
7
value 0.00437
scoring_system epss
scoring_elements 0.63028
published_at 2026-04-13T12:55:00Z
8
value 0.00437
scoring_system epss
scoring_elements 0.63072
published_at 2026-04-18T12:55:00Z
9
value 0.00437
scoring_system epss
scoring_elements 0.63071
published_at 2026-04-24T12:55:00Z
10
value 0.00437
scoring_system epss
scoring_elements 0.63085
published_at 2026-04-26T12:55:00Z
11
value 0.00437
scoring_system epss
scoring_elements 0.63084
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-6931
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44879
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44879
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25775
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25775
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34324
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34324
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35827
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35827
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45863
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45863
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46813
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46813
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46862
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46862
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5178
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5178
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51780
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51780
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51781
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51782
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5197
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5197
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5717
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5717
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6121
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6121
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6531
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6531
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6817
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6817
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6931
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6931
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6932
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6932
20
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
21
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2252731
reference_id 2252731
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2252731
22
reference_url https://access.redhat.com/errata/RHSA-2024:0930
reference_id RHSA-2024:0930
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0930
23
reference_url https://access.redhat.com/errata/RHSA-2024:1018
reference_id RHSA-2024:1018
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1018
24
reference_url https://access.redhat.com/errata/RHSA-2024:1019
reference_id RHSA-2024:1019
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1019
25
reference_url https://access.redhat.com/errata/RHSA-2024:1404
reference_id RHSA-2024:1404
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1404
26
reference_url https://access.redhat.com/errata/RHSA-2024:1607
reference_id RHSA-2024:1607
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1607
27
reference_url https://access.redhat.com/errata/RHSA-2024:1614
reference_id RHSA-2024:1614
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1614
28
reference_url https://access.redhat.com/errata/RHSA-2024:1836
reference_id RHSA-2024:1836
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1836
29
reference_url https://access.redhat.com/errata/RHSA-2024:1840
reference_id RHSA-2024:1840
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1840
30
reference_url https://access.redhat.com/errata/RHSA-2024:2093
reference_id RHSA-2024:2093
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2093
31
reference_url https://access.redhat.com/errata/RHSA-2024:2394
reference_id RHSA-2024:2394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2394
32
reference_url https://usn.ubuntu.com/6602-1/
reference_id USN-6602-1
reference_type
scores
url https://usn.ubuntu.com/6602-1/
33
reference_url https://usn.ubuntu.com/6603-1/
reference_id USN-6603-1
reference_type
scores
url https://usn.ubuntu.com/6603-1/
34
reference_url https://usn.ubuntu.com/6604-1/
reference_id USN-6604-1
reference_type
scores
url https://usn.ubuntu.com/6604-1/
35
reference_url https://usn.ubuntu.com/6604-2/
reference_id USN-6604-2
reference_type
scores
url https://usn.ubuntu.com/6604-2/
36
reference_url https://usn.ubuntu.com/6605-1/
reference_id USN-6605-1
reference_type
scores
url https://usn.ubuntu.com/6605-1/
37
reference_url https://usn.ubuntu.com/6605-2/
reference_id USN-6605-2
reference_type
scores
url https://usn.ubuntu.com/6605-2/
38
reference_url https://usn.ubuntu.com/6606-1/
reference_id USN-6606-1
reference_type
scores
url https://usn.ubuntu.com/6606-1/
39
reference_url https://usn.ubuntu.com/6607-1/
reference_id USN-6607-1
reference_type
scores
url https://usn.ubuntu.com/6607-1/
40
reference_url https://usn.ubuntu.com/6608-1/
reference_id USN-6608-1
reference_type
scores
url https://usn.ubuntu.com/6608-1/
41
reference_url https://usn.ubuntu.com/6608-2/
reference_id USN-6608-2
reference_type
scores
url https://usn.ubuntu.com/6608-2/
42
reference_url https://usn.ubuntu.com/6609-1/
reference_id USN-6609-1
reference_type
scores
url https://usn.ubuntu.com/6609-1/
43
reference_url https://usn.ubuntu.com/6609-2/
reference_id USN-6609-2
reference_type
scores
url https://usn.ubuntu.com/6609-2/
44
reference_url https://usn.ubuntu.com/6609-3/
reference_id USN-6609-3
reference_type
scores
url https://usn.ubuntu.com/6609-3/
45
reference_url https://usn.ubuntu.com/6628-1/
reference_id USN-6628-1
reference_type
scores
url https://usn.ubuntu.com/6628-1/
46
reference_url https://usn.ubuntu.com/6628-2/
reference_id USN-6628-2
reference_type
scores
url https://usn.ubuntu.com/6628-2/
47
reference_url https://usn.ubuntu.com/6635-1/
reference_id USN-6635-1
reference_type
scores
url https://usn.ubuntu.com/6635-1/
fixed_packages
aliases CVE-2023-6931
risk_score 3.1
exploitability 0.5
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wmdx-p5fr-yqe4
Fixing_vulnerabilities
Risk_score10.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@5.14.0-284.55.1%3Farch=el9_2