Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/kernel-rt@4.18.0-477.21.1.rt7.284?arch=el8_8
Typerpm
Namespaceredhat
Namekernel-rt
Version4.18.0-477.21.1.rt7.284
Qualifiers
arch el8_8
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-4nqf-ct5y-6uev
vulnerability_id VCID-4nqf-ct5y-6uev
summary kernel: use-after-free in l2cap_connect and l2cap_le_connect_req in net/bluetooth/l2cap_core.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42896.json
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42896.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-42896
reference_id
reference_type
scores
0
value 0.00421
scoring_system epss
scoring_elements 0.62
published_at 2026-04-24T12:55:00Z
1
value 0.00421
scoring_system epss
scoring_elements 0.61946
published_at 2026-04-04T12:55:00Z
2
value 0.00421
scoring_system epss
scoring_elements 0.61966
published_at 2026-04-08T12:55:00Z
3
value 0.00421
scoring_system epss
scoring_elements 0.61983
published_at 2026-04-09T12:55:00Z
4
value 0.00421
scoring_system epss
scoring_elements 0.62004
published_at 2026-04-11T12:55:00Z
5
value 0.00421
scoring_system epss
scoring_elements 0.61994
published_at 2026-04-12T12:55:00Z
6
value 0.00421
scoring_system epss
scoring_elements 0.61973
published_at 2026-04-13T12:55:00Z
7
value 0.00421
scoring_system epss
scoring_elements 0.62015
published_at 2026-04-16T12:55:00Z
8
value 0.00421
scoring_system epss
scoring_elements 0.62021
published_at 2026-04-18T12:55:00Z
9
value 0.00421
scoring_system epss
scoring_elements 0.62003
published_at 2026-04-21T12:55:00Z
10
value 0.00421
scoring_system epss
scoring_elements 0.61916
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-42896
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42896
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42896
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2147364
reference_id 2147364
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2147364
5
reference_url https://kernel.dance/#711f8c3fb3db61897080468586b970c87c61d9e4
reference_id #711f8c3fb3db61897080468586b970c87c61d9e4
reference_type
scores
0
value 8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T13:37:08Z/
url https://kernel.dance/#711f8c3fb3db61897080468586b970c87c61d9e4
6
reference_url https://github.com/torvalds/linux/commit/711f8c3fb3db61897080468586b970c87c61d9e4
reference_id 711f8c3fb3db61897080468586b970c87c61d9e4
reference_type
scores
0
value 8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T13:37:08Z/
url https://github.com/torvalds/linux/commit/711f8c3fb3db61897080468586b970c87c61d9e4
7
reference_url https://security.archlinux.org/AVG-2834
reference_id AVG-2834
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2834
8
reference_url https://security.archlinux.org/AVG-2835
reference_id AVG-2835
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2835
9
reference_url https://security.archlinux.org/AVG-2836
reference_id AVG-2836
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2836
10
reference_url https://security.archlinux.org/AVG-2837
reference_id AVG-2837
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2837
11
reference_url https://access.redhat.com/errata/RHSA-2023:2148
reference_id RHSA-2023:2148
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2148
12
reference_url https://access.redhat.com/errata/RHSA-2023:2458
reference_id RHSA-2023:2458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2458
13
reference_url https://access.redhat.com/errata/RHSA-2023:3461
reference_id RHSA-2023:3461
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3461
14
reference_url https://access.redhat.com/errata/RHSA-2023:3462
reference_id RHSA-2023:3462
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3462
15
reference_url https://access.redhat.com/errata/RHSA-2023:3517
reference_id RHSA-2023:3517
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3517
16
reference_url https://access.redhat.com/errata/RHSA-2023:4137
reference_id RHSA-2023:4137
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4137
17
reference_url https://access.redhat.com/errata/RHSA-2023:4138
reference_id RHSA-2023:4138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4138
18
reference_url https://access.redhat.com/errata/RHSA-2023:4230
reference_id RHSA-2023:4230
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4230
19
reference_url https://access.redhat.com/errata/RHSA-2023:4517
reference_id RHSA-2023:4517
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4517
20
reference_url https://access.redhat.com/errata/RHSA-2023:4531
reference_id RHSA-2023:4531
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4531
21
reference_url https://access.redhat.com/errata/RHSA-2023:4541
reference_id RHSA-2023:4541
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4541
22
reference_url https://access.redhat.com/errata/RHSA-2023:4789
reference_id RHSA-2023:4789
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4789
23
reference_url https://access.redhat.com/errata/RHSA-2023:4888
reference_id RHSA-2023:4888
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4888
24
reference_url https://access.redhat.com/errata/RHSA-2023:5580
reference_id RHSA-2023:5580
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5580
25
reference_url https://access.redhat.com/errata/RHSA-2023:5588
reference_id RHSA-2023:5588
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5588
26
reference_url https://access.redhat.com/errata/RHSA-2023:5589
reference_id RHSA-2023:5589
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5589
27
reference_url https://access.redhat.com/errata/RHSA-2024:0980
reference_id RHSA-2024:0980
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0980
28
reference_url https://access.redhat.com/errata/RHSA-2024:1249
reference_id RHSA-2024:1249
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1249
29
reference_url https://access.redhat.com/errata/RHSA-2024:1323
reference_id RHSA-2024:1323
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1323
30
reference_url https://access.redhat.com/errata/RHSA-2024:1332
reference_id RHSA-2024:1332
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1332
31
reference_url https://access.redhat.com/errata/RHSA-2024:1746
reference_id RHSA-2024:1746
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1746
32
reference_url https://usn.ubuntu.com/5780-1/
reference_id USN-5780-1
reference_type
scores
url https://usn.ubuntu.com/5780-1/
33
reference_url https://usn.ubuntu.com/5783-1/
reference_id USN-5783-1
reference_type
scores
url https://usn.ubuntu.com/5783-1/
34
reference_url https://usn.ubuntu.com/5794-1/
reference_id USN-5794-1
reference_type
scores
url https://usn.ubuntu.com/5794-1/
35
reference_url https://usn.ubuntu.com/5802-1/
reference_id USN-5802-1
reference_type
scores
url https://usn.ubuntu.com/5802-1/
36
reference_url https://usn.ubuntu.com/5803-1/
reference_id USN-5803-1
reference_type
scores
url https://usn.ubuntu.com/5803-1/
37
reference_url https://usn.ubuntu.com/5804-1/
reference_id USN-5804-1
reference_type
scores
url https://usn.ubuntu.com/5804-1/
38
reference_url https://usn.ubuntu.com/5804-2/
reference_id USN-5804-2
reference_type
scores
url https://usn.ubuntu.com/5804-2/
39
reference_url https://usn.ubuntu.com/5808-1/
reference_id USN-5808-1
reference_type
scores
url https://usn.ubuntu.com/5808-1/
40
reference_url https://usn.ubuntu.com/5809-1/
reference_id USN-5809-1
reference_type
scores
url https://usn.ubuntu.com/5809-1/
41
reference_url https://usn.ubuntu.com/5813-1/
reference_id USN-5813-1
reference_type
scores
url https://usn.ubuntu.com/5813-1/
42
reference_url https://usn.ubuntu.com/5814-1/
reference_id USN-5814-1
reference_type
scores
url https://usn.ubuntu.com/5814-1/
43
reference_url https://usn.ubuntu.com/5829-1/
reference_id USN-5829-1
reference_type
scores
url https://usn.ubuntu.com/5829-1/
44
reference_url https://usn.ubuntu.com/5830-1/
reference_id USN-5830-1
reference_type
scores
url https://usn.ubuntu.com/5830-1/
45
reference_url https://usn.ubuntu.com/5831-1/
reference_id USN-5831-1
reference_type
scores
url https://usn.ubuntu.com/5831-1/
46
reference_url https://usn.ubuntu.com/5832-1/
reference_id USN-5832-1
reference_type
scores
url https://usn.ubuntu.com/5832-1/
47
reference_url https://usn.ubuntu.com/5860-1/
reference_id USN-5860-1
reference_type
scores
url https://usn.ubuntu.com/5860-1/
48
reference_url https://usn.ubuntu.com/5861-1/
reference_id USN-5861-1
reference_type
scores
url https://usn.ubuntu.com/5861-1/
49
reference_url https://usn.ubuntu.com/5863-1/
reference_id USN-5863-1
reference_type
scores
url https://usn.ubuntu.com/5863-1/
50
reference_url https://usn.ubuntu.com/5875-1/
reference_id USN-5875-1
reference_type
scores
url https://usn.ubuntu.com/5875-1/
51
reference_url https://usn.ubuntu.com/5877-1/
reference_id USN-5877-1
reference_type
scores
url https://usn.ubuntu.com/5877-1/
52
reference_url https://usn.ubuntu.com/5879-1/
reference_id USN-5879-1
reference_type
scores
url https://usn.ubuntu.com/5879-1/
53
reference_url https://usn.ubuntu.com/5914-1/
reference_id USN-5914-1
reference_type
scores
url https://usn.ubuntu.com/5914-1/
54
reference_url https://usn.ubuntu.com/5918-1/
reference_id USN-5918-1
reference_type
scores
url https://usn.ubuntu.com/5918-1/
fixed_packages
aliases CVE-2022-42896
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4nqf-ct5y-6uev
1
url VCID-qyu7-kx5f-8qek
vulnerability_id VCID-qyu7-kx5f-8qek
summary kernel: Use-after-free vulnerability in the Linux Kernel traffic control index filter
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1829.json
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1829.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-1829
reference_id
reference_type
scores
0
value 0.00216
scoring_system epss
scoring_elements 0.44129
published_at 2026-04-02T12:55:00Z
1
value 0.00216
scoring_system epss
scoring_elements 0.44152
published_at 2026-04-04T12:55:00Z
2
value 0.00216
scoring_system epss
scoring_elements 0.44153
published_at 2026-04-11T12:55:00Z
3
value 0.00216
scoring_system epss
scoring_elements 0.44137
published_at 2026-04-09T12:55:00Z
4
value 0.00216
scoring_system epss
scoring_elements 0.44134
published_at 2026-04-08T12:55:00Z
5
value 0.00216
scoring_system epss
scoring_elements 0.44083
published_at 2026-04-07T12:55:00Z
6
value 0.00216
scoring_system epss
scoring_elements 0.4412
published_at 2026-04-12T12:55:00Z
7
value 0.00231
scoring_system epss
scoring_elements 0.45958
published_at 2026-04-21T12:55:00Z
8
value 0.00231
scoring_system epss
scoring_elements 0.46013
published_at 2026-04-18T12:55:00Z
9
value 0.00231
scoring_system epss
scoring_elements 0.46017
published_at 2026-04-16T12:55:00Z
10
value 0.00231
scoring_system epss
scoring_elements 0.45965
published_at 2026-04-13T12:55:00Z
11
value 0.00254
scoring_system epss
scoring_elements 0.48727
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-1829
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1829
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1829
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2188470
reference_id 2188470
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2188470
5
reference_url https://kernel.dance/#8c710f75256bb3cf05ac7b1672c82b92c43f3d28
reference_id #8c710f75256bb3cf05ac7b1672c82b92c43f3d28
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-07T15:50:09Z/
url https://kernel.dance/#8c710f75256bb3cf05ac7b1672c82b92c43f3d28
6
reference_url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8c710f75256bb3cf05ac7b1672c82b92c43f3d28
reference_id ?id=8c710f75256bb3cf05ac7b1672c82b92c43f3d28
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-07T15:50:09Z/
url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8c710f75256bb3cf05ac7b1672c82b92c43f3d28
7
reference_url https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html
reference_id msg00005.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-07T15:50:09Z/
url https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html
8
reference_url https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html
reference_id msg00006.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-07T15:50:09Z/
url https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html
9
reference_url https://security.netapp.com/advisory/ntap-20230601-0001/
reference_id ntap-20230601-0001
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-07T15:50:09Z/
url https://security.netapp.com/advisory/ntap-20230601-0001/
10
reference_url https://access.redhat.com/errata/RHSA-2023:4515
reference_id RHSA-2023:4515
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4515
11
reference_url https://access.redhat.com/errata/RHSA-2023:4516
reference_id RHSA-2023:4516
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4516
12
reference_url https://access.redhat.com/errata/RHSA-2023:4517
reference_id RHSA-2023:4517
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4517
13
reference_url https://access.redhat.com/errata/RHSA-2023:4531
reference_id RHSA-2023:4531
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4531
14
reference_url https://access.redhat.com/errata/RHSA-2023:4541
reference_id RHSA-2023:4541
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4541
15
reference_url https://access.redhat.com/errata/RHSA-2023:4789
reference_id RHSA-2023:4789
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4789
16
reference_url https://access.redhat.com/errata/RHSA-2023:4888
reference_id RHSA-2023:4888
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4888
17
reference_url https://access.redhat.com/errata/RHSA-2023:4961
reference_id RHSA-2023:4961
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4961
18
reference_url https://access.redhat.com/errata/RHSA-2023:4962
reference_id RHSA-2023:4962
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4962
19
reference_url https://access.redhat.com/errata/RHSA-2023:4967
reference_id RHSA-2023:4967
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4967
20
reference_url https://access.redhat.com/errata/RHSA-2023:7417
reference_id RHSA-2023:7417
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7417
21
reference_url https://access.redhat.com/errata/RHSA-2023:7431
reference_id RHSA-2023:7431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7431
22
reference_url https://access.redhat.com/errata/RHSA-2023:7434
reference_id RHSA-2023:7434
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7434
23
reference_url https://usn.ubuntu.com/6033-1/
reference_id USN-6033-1
reference_type
scores
url https://usn.ubuntu.com/6033-1/
24
reference_url https://usn.ubuntu.com/6043-1/
reference_id USN-6043-1
reference_type
scores
url https://usn.ubuntu.com/6043-1/
25
reference_url https://usn.ubuntu.com/6044-1/
reference_id USN-6044-1
reference_type
scores
url https://usn.ubuntu.com/6044-1/
26
reference_url https://usn.ubuntu.com/6045-1/
reference_id USN-6045-1
reference_type
scores
url https://usn.ubuntu.com/6045-1/
27
reference_url https://usn.ubuntu.com/6047-1/
reference_id USN-6047-1
reference_type
scores
url https://usn.ubuntu.com/6047-1/
28
reference_url https://usn.ubuntu.com/6051-1/
reference_id USN-6051-1
reference_type
scores
url https://usn.ubuntu.com/6051-1/
29
reference_url https://usn.ubuntu.com/6052-1/
reference_id USN-6052-1
reference_type
scores
url https://usn.ubuntu.com/6052-1/
30
reference_url https://usn.ubuntu.com/6058-1/
reference_id USN-6058-1
reference_type
scores
url https://usn.ubuntu.com/6058-1/
31
reference_url https://usn.ubuntu.com/6069-1/
reference_id USN-6069-1
reference_type
scores
url https://usn.ubuntu.com/6069-1/
32
reference_url https://usn.ubuntu.com/6070-1/
reference_id USN-6070-1
reference_type
scores
url https://usn.ubuntu.com/6070-1/
33
reference_url https://usn.ubuntu.com/6071-1/
reference_id USN-6071-1
reference_type
scores
url https://usn.ubuntu.com/6071-1/
34
reference_url https://usn.ubuntu.com/6072-1/
reference_id USN-6072-1
reference_type
scores
url https://usn.ubuntu.com/6072-1/
35
reference_url https://usn.ubuntu.com/6093-1/
reference_id USN-6093-1
reference_type
scores
url https://usn.ubuntu.com/6093-1/
36
reference_url https://usn.ubuntu.com/6107-1/
reference_id USN-6107-1
reference_type
scores
url https://usn.ubuntu.com/6107-1/
37
reference_url https://usn.ubuntu.com/6133-1/
reference_id USN-6133-1
reference_type
scores
url https://usn.ubuntu.com/6133-1/
38
reference_url https://usn.ubuntu.com/6134-1/
reference_id USN-6134-1
reference_type
scores
url https://usn.ubuntu.com/6134-1/
39
reference_url https://usn.ubuntu.com/6222-1/
reference_id USN-6222-1
reference_type
scores
url https://usn.ubuntu.com/6222-1/
40
reference_url https://usn.ubuntu.com/6256-1/
reference_id USN-6256-1
reference_type
scores
url https://usn.ubuntu.com/6256-1/
fixed_packages
aliases CVE-2023-1829
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qyu7-kx5f-8qek
2
url VCID-t7q4-3b72-u3a5
vulnerability_id VCID-t7q4-3b72-u3a5
summary kernel: OOB access in the Linux kernel's XFS subsystem
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2124.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2124.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-2124
reference_id
reference_type
scores
0
value 0.0002
scoring_system epss
scoring_elements 0.05463
published_at 2026-04-21T12:55:00Z
1
value 0.00021
scoring_system epss
scoring_elements 0.0554
published_at 2026-04-07T12:55:00Z
2
value 0.00021
scoring_system epss
scoring_elements 0.05578
published_at 2026-04-08T12:55:00Z
3
value 0.00021
scoring_system epss
scoring_elements 0.05601
published_at 2026-04-09T12:55:00Z
4
value 0.00021
scoring_system epss
scoring_elements 0.05562
published_at 2026-04-12T12:55:00Z
5
value 0.00021
scoring_system epss
scoring_elements 0.05555
published_at 2026-04-13T12:55:00Z
6
value 0.00021
scoring_system epss
scoring_elements 0.05504
published_at 2026-04-16T12:55:00Z
7
value 0.00021
scoring_system epss
scoring_elements 0.05513
published_at 2026-04-18T12:55:00Z
8
value 0.00021
scoring_system epss
scoring_elements 0.05574
published_at 2026-04-11T12:55:00Z
9
value 0.00021
scoring_system epss
scoring_elements 0.05505
published_at 2026-04-02T12:55:00Z
10
value 0.00022
scoring_system epss
scoring_elements 0.06131
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-2124
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39189
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39189
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4269
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4269
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1206
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1206
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1380
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1380
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2002
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2002
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2007
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2007
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20588
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20588
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2124
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2124
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21255
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21255
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21400
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21400
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2269
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2269
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2898
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2898
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3090
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3090
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31084
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31084
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3111
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3111
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3212
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3212
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3268
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3268
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3338
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3338
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3389
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3389
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34319
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34319
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35788
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35788
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3609
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3609
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3611
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3611
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3776
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3863
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3863
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4004
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4004
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40283
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40283
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4132
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4132
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4147
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4147
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4194
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4194
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4273
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4273
33
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
34
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2187439
reference_id 2187439
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2187439
35
reference_url https://access.redhat.com/errata/RHSA-2023:3708
reference_id RHSA-2023:3708
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3708
36
reference_url https://access.redhat.com/errata/RHSA-2023:3723
reference_id RHSA-2023:3723
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3723
37
reference_url https://access.redhat.com/errata/RHSA-2023:4137
reference_id RHSA-2023:4137
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4137
38
reference_url https://access.redhat.com/errata/RHSA-2023:4138
reference_id RHSA-2023:4138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4138
39
reference_url https://access.redhat.com/errata/RHSA-2023:4515
reference_id RHSA-2023:4515
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4515
40
reference_url https://access.redhat.com/errata/RHSA-2023:4517
reference_id RHSA-2023:4517
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4517
41
reference_url https://access.redhat.com/errata/RHSA-2023:4541
reference_id RHSA-2023:4541
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4541
42
reference_url https://access.redhat.com/errata/RHSA-2023:4789
reference_id RHSA-2023:4789
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4789
43
reference_url https://access.redhat.com/errata/RHSA-2023:4815
reference_id RHSA-2023:4815
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4815
44
reference_url https://access.redhat.com/errata/RHSA-2023:4817
reference_id RHSA-2023:4817
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4817
45
reference_url https://access.redhat.com/errata/RHSA-2023:4961
reference_id RHSA-2023:4961
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4961
46
reference_url https://access.redhat.com/errata/RHSA-2023:4962
reference_id RHSA-2023:4962
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4962
47
reference_url https://usn.ubuntu.com/6206-1/
reference_id USN-6206-1
reference_type
scores
url https://usn.ubuntu.com/6206-1/
48
reference_url https://usn.ubuntu.com/6224-1/
reference_id USN-6224-1
reference_type
scores
url https://usn.ubuntu.com/6224-1/
49
reference_url https://usn.ubuntu.com/6228-1/
reference_id USN-6228-1
reference_type
scores
url https://usn.ubuntu.com/6228-1/
50
reference_url https://usn.ubuntu.com/6231-1/
reference_id USN-6231-1
reference_type
scores
url https://usn.ubuntu.com/6231-1/
51
reference_url https://usn.ubuntu.com/6235-1/
reference_id USN-6235-1
reference_type
scores
url https://usn.ubuntu.com/6235-1/
52
reference_url https://usn.ubuntu.com/6252-1/
reference_id USN-6252-1
reference_type
scores
url https://usn.ubuntu.com/6252-1/
53
reference_url https://usn.ubuntu.com/6254-1/
reference_id USN-6254-1
reference_type
scores
url https://usn.ubuntu.com/6254-1/
54
reference_url https://usn.ubuntu.com/6284-1/
reference_id USN-6284-1
reference_type
scores
url https://usn.ubuntu.com/6284-1/
55
reference_url https://usn.ubuntu.com/6300-1/
reference_id USN-6300-1
reference_type
scores
url https://usn.ubuntu.com/6300-1/
56
reference_url https://usn.ubuntu.com/6301-1/
reference_id USN-6301-1
reference_type
scores
url https://usn.ubuntu.com/6301-1/
57
reference_url https://usn.ubuntu.com/6311-1/
reference_id USN-6311-1
reference_type
scores
url https://usn.ubuntu.com/6311-1/
58
reference_url https://usn.ubuntu.com/6312-1/
reference_id USN-6312-1
reference_type
scores
url https://usn.ubuntu.com/6312-1/
59
reference_url https://usn.ubuntu.com/6314-1/
reference_id USN-6314-1
reference_type
scores
url https://usn.ubuntu.com/6314-1/
60
reference_url https://usn.ubuntu.com/6331-1/
reference_id USN-6331-1
reference_type
scores
url https://usn.ubuntu.com/6331-1/
61
reference_url https://usn.ubuntu.com/6332-1/
reference_id USN-6332-1
reference_type
scores
url https://usn.ubuntu.com/6332-1/
62
reference_url https://usn.ubuntu.com/6337-1/
reference_id USN-6337-1
reference_type
scores
url https://usn.ubuntu.com/6337-1/
63
reference_url https://usn.ubuntu.com/6347-1/
reference_id USN-6347-1
reference_type
scores
url https://usn.ubuntu.com/6347-1/
fixed_packages
aliases CVE-2023-2124
risk_score 3.1
exploitability 0.5
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-t7q4-3b72-u3a5
3
url VCID-va4k-cpus-nqdm
vulnerability_id VCID-va4k-cpus-nqdm
summary kernel: tcindex: use-after-free vulnerability in traffic control index filter allows privilege escalation
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1281.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1281.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-1281
reference_id
reference_type
scores
0
value 0.00016
scoring_system epss
scoring_elements 0.03927
published_at 2026-04-24T12:55:00Z
1
value 0.00016
scoring_system epss
scoring_elements 0.03914
published_at 2026-04-21T12:55:00Z
2
value 0.00017
scoring_system epss
scoring_elements 0.03952
published_at 2026-04-04T12:55:00Z
3
value 0.00017
scoring_system epss
scoring_elements 0.03942
published_at 2026-04-02T12:55:00Z
4
value 0.00017
scoring_system epss
scoring_elements 0.03969
published_at 2026-04-08T12:55:00Z
5
value 0.00017
scoring_system epss
scoring_elements 0.03964
published_at 2026-04-07T12:55:00Z
6
value 0.00018
scoring_system epss
scoring_elements 0.04458
published_at 2026-04-18T12:55:00Z
7
value 0.00018
scoring_system epss
scoring_elements 0.04523
published_at 2026-04-09T12:55:00Z
8
value 0.00018
scoring_system epss
scoring_elements 0.0445
published_at 2026-04-16T12:55:00Z
9
value 0.00018
scoring_system epss
scoring_elements 0.0448
published_at 2026-04-13T12:55:00Z
10
value 0.00018
scoring_system epss
scoring_elements 0.04497
published_at 2026-04-12T12:55:00Z
11
value 0.00018
scoring_system epss
scoring_elements 0.04512
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-1281
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1281
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1281
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2181847
reference_id 2181847
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2181847
5
reference_url http://www.openwall.com/lists/oss-security/2023/04/11/3
reference_id 3
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T18:43:38Z/
url http://www.openwall.com/lists/oss-security/2023/04/11/3
6
reference_url https://kernel.dance/#ee059170b1f7e94e55fa6cadee544e176a6e59c2
reference_id #ee059170b1f7e94e55fa6cadee544e176a6e59c2
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T18:43:38Z/
url https://kernel.dance/#ee059170b1f7e94e55fa6cadee544e176a6e59c2
7
reference_url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ee059170b1f7e94e55fa6cadee544e176a6e59c2
reference_id ?id=ee059170b1f7e94e55fa6cadee544e176a6e59c2
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T18:43:38Z/
url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ee059170b1f7e94e55fa6cadee544e176a6e59c2
8
reference_url https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html
reference_id msg00005.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T18:43:38Z/
url https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html
9
reference_url https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html
reference_id msg00006.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T18:43:38Z/
url https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html
10
reference_url https://security.netapp.com/advisory/ntap-20230427-0004/
reference_id ntap-20230427-0004
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T18:43:38Z/
url https://security.netapp.com/advisory/ntap-20230427-0004/
11
reference_url https://access.redhat.com/errata/RHSA-2023:3852
reference_id RHSA-2023:3852
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3852
12
reference_url https://access.redhat.com/errata/RHSA-2023:3853
reference_id RHSA-2023:3853
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3853
13
reference_url https://access.redhat.com/errata/RHSA-2023:4125
reference_id RHSA-2023:4125
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4125
14
reference_url https://access.redhat.com/errata/RHSA-2023:4126
reference_id RHSA-2023:4126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4126
15
reference_url https://access.redhat.com/errata/RHSA-2023:4130
reference_id RHSA-2023:4130
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4130
16
reference_url https://access.redhat.com/errata/RHSA-2023:4145
reference_id RHSA-2023:4145
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4145
17
reference_url https://access.redhat.com/errata/RHSA-2023:4146
reference_id RHSA-2023:4146
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4146
18
reference_url https://access.redhat.com/errata/RHSA-2023:4255
reference_id RHSA-2023:4255
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4255
19
reference_url https://access.redhat.com/errata/RHSA-2023:4256
reference_id RHSA-2023:4256
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4256
20
reference_url https://access.redhat.com/errata/RHSA-2023:4262
reference_id RHSA-2023:4262
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4262
21
reference_url https://access.redhat.com/errata/RHSA-2023:4517
reference_id RHSA-2023:4517
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4517
22
reference_url https://access.redhat.com/errata/RHSA-2023:4531
reference_id RHSA-2023:4531
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4531
23
reference_url https://access.redhat.com/errata/RHSA-2023:4541
reference_id RHSA-2023:4541
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4541
24
reference_url https://usn.ubuntu.com/5977-1/
reference_id USN-5977-1
reference_type
scores
url https://usn.ubuntu.com/5977-1/
25
reference_url https://usn.ubuntu.com/5978-1/
reference_id USN-5978-1
reference_type
scores
url https://usn.ubuntu.com/5978-1/
26
reference_url https://usn.ubuntu.com/6024-1/
reference_id USN-6024-1
reference_type
scores
url https://usn.ubuntu.com/6024-1/
27
reference_url https://usn.ubuntu.com/6025-1/
reference_id USN-6025-1
reference_type
scores
url https://usn.ubuntu.com/6025-1/
28
reference_url https://usn.ubuntu.com/6027-1/
reference_id USN-6027-1
reference_type
scores
url https://usn.ubuntu.com/6027-1/
29
reference_url https://usn.ubuntu.com/6029-1/
reference_id USN-6029-1
reference_type
scores
url https://usn.ubuntu.com/6029-1/
30
reference_url https://usn.ubuntu.com/6030-1/
reference_id USN-6030-1
reference_type
scores
url https://usn.ubuntu.com/6030-1/
31
reference_url https://usn.ubuntu.com/6031-1/
reference_id USN-6031-1
reference_type
scores
url https://usn.ubuntu.com/6031-1/
32
reference_url https://usn.ubuntu.com/6040-1/
reference_id USN-6040-1
reference_type
scores
url https://usn.ubuntu.com/6040-1/
33
reference_url https://usn.ubuntu.com/6057-1/
reference_id USN-6057-1
reference_type
scores
url https://usn.ubuntu.com/6057-1/
34
reference_url https://usn.ubuntu.com/6093-1/
reference_id USN-6093-1
reference_type
scores
url https://usn.ubuntu.com/6093-1/
35
reference_url https://usn.ubuntu.com/6134-1/
reference_id USN-6134-1
reference_type
scores
url https://usn.ubuntu.com/6134-1/
36
reference_url https://usn.ubuntu.com/6222-1/
reference_id USN-6222-1
reference_type
scores
url https://usn.ubuntu.com/6222-1/
37
reference_url https://usn.ubuntu.com/6256-1/
reference_id USN-6256-1
reference_type
scores
url https://usn.ubuntu.com/6256-1/
fixed_packages
aliases CVE-2023-1281
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-va4k-cpus-nqdm
4
url VCID-x8ys-erbg-vkcy
vulnerability_id VCID-x8ys-erbg-vkcy
summary kernel: i2c: out-of-bounds write in xgene_slimpro_i2c_xfer()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2194.json
reference_id
reference_type
scores
0
value 6.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2194.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-2194
reference_id
reference_type
scores
0
value 0.00017
scoring_system epss
scoring_elements 0.04187
published_at 2026-04-02T12:55:00Z
1
value 0.00017
scoring_system epss
scoring_elements 0.04334
published_at 2026-04-24T12:55:00Z
2
value 0.00017
scoring_system epss
scoring_elements 0.04224
published_at 2026-04-07T12:55:00Z
3
value 0.00017
scoring_system epss
scoring_elements 0.04254
published_at 2026-04-08T12:55:00Z
4
value 0.00017
scoring_system epss
scoring_elements 0.04269
published_at 2026-04-09T12:55:00Z
5
value 0.00017
scoring_system epss
scoring_elements 0.04256
published_at 2026-04-11T12:55:00Z
6
value 0.00017
scoring_system epss
scoring_elements 0.0424
published_at 2026-04-12T12:55:00Z
7
value 0.00017
scoring_system epss
scoring_elements 0.04217
published_at 2026-04-13T12:55:00Z
8
value 0.00017
scoring_system epss
scoring_elements 0.04186
published_at 2026-04-16T12:55:00Z
9
value 0.00017
scoring_system epss
scoring_elements 0.04197
published_at 2026-04-18T12:55:00Z
10
value 0.00017
scoring_system epss
scoring_elements 0.04318
published_at 2026-04-21T12:55:00Z
11
value 0.00017
scoring_system epss
scoring_elements 0.04207
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-2194
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2194
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2194
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2188396
reference_id 2188396
reference_type
scores
0
value 6.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:28:33Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2188396
5
reference_url https://github.com/torvalds/linux/commit/92fbb6d1296f
reference_id 92fbb6d1296f
reference_type
scores
0
value 6.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:28:33Z/
url https://github.com/torvalds/linux/commit/92fbb6d1296f
6
reference_url https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html
reference_id msg00005.html
reference_type
scores
0
value 6.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:28:33Z/
url https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html
7
reference_url https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html
reference_id msg00006.html
reference_type
scores
0
value 6.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:28:33Z/
url https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html
8
reference_url https://access.redhat.com/errata/RHSA-2023:3708
reference_id RHSA-2023:3708
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3708
9
reference_url https://access.redhat.com/errata/RHSA-2023:3723
reference_id RHSA-2023:3723
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3723
10
reference_url https://access.redhat.com/errata/RHSA-2023:4517
reference_id RHSA-2023:4517
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4517
11
reference_url https://access.redhat.com/errata/RHSA-2023:4541
reference_id RHSA-2023:4541
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4541
12
reference_url https://access.redhat.com/errata/RHSA-2024:0412
reference_id RHSA-2024:0412
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0412
13
reference_url https://usn.ubuntu.com/6175-1/
reference_id USN-6175-1
reference_type
scores
url https://usn.ubuntu.com/6175-1/
14
reference_url https://usn.ubuntu.com/6186-1/
reference_id USN-6186-1
reference_type
scores
url https://usn.ubuntu.com/6186-1/
15
reference_url https://usn.ubuntu.com/6284-1/
reference_id USN-6284-1
reference_type
scores
url https://usn.ubuntu.com/6284-1/
16
reference_url https://usn.ubuntu.com/6300-1/
reference_id USN-6300-1
reference_type
scores
url https://usn.ubuntu.com/6300-1/
17
reference_url https://usn.ubuntu.com/6301-1/
reference_id USN-6301-1
reference_type
scores
url https://usn.ubuntu.com/6301-1/
18
reference_url https://usn.ubuntu.com/6311-1/
reference_id USN-6311-1
reference_type
scores
url https://usn.ubuntu.com/6311-1/
19
reference_url https://usn.ubuntu.com/6312-1/
reference_id USN-6312-1
reference_type
scores
url https://usn.ubuntu.com/6312-1/
20
reference_url https://usn.ubuntu.com/6314-1/
reference_id USN-6314-1
reference_type
scores
url https://usn.ubuntu.com/6314-1/
21
reference_url https://usn.ubuntu.com/6331-1/
reference_id USN-6331-1
reference_type
scores
url https://usn.ubuntu.com/6331-1/
22
reference_url https://usn.ubuntu.com/6332-1/
reference_id USN-6332-1
reference_type
scores
url https://usn.ubuntu.com/6332-1/
23
reference_url https://usn.ubuntu.com/6337-1/
reference_id USN-6337-1
reference_type
scores
url https://usn.ubuntu.com/6337-1/
24
reference_url https://usn.ubuntu.com/6347-1/
reference_id USN-6347-1
reference_type
scores
url https://usn.ubuntu.com/6347-1/
fixed_packages
aliases CVE-2023-2194
risk_score 3.0
exploitability 0.5
weighted_severity 6.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-x8ys-erbg-vkcy
5
url VCID-zsmq-81fu-q3fq
vulnerability_id VCID-zsmq-81fu-q3fq
summary kernel: use-after-free vulnerability in the perf_group_detach function of the Linux Kernel Performance Events
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2235.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2235.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-2235
reference_id
reference_type
scores
0
value 0.00014
scoring_system epss
scoring_elements 0.02509
published_at 2026-04-18T12:55:00Z
1
value 0.00014
scoring_system epss
scoring_elements 0.02601
published_at 2026-04-24T12:55:00Z
2
value 0.00014
scoring_system epss
scoring_elements 0.02529
published_at 2026-04-11T12:55:00Z
3
value 0.00014
scoring_system epss
scoring_elements 0.02518
published_at 2026-04-12T12:55:00Z
4
value 0.00014
scoring_system epss
scoring_elements 0.02517
published_at 2026-04-13T12:55:00Z
5
value 0.00014
scoring_system epss
scoring_elements 0.02504
published_at 2026-04-16T12:55:00Z
6
value 0.00014
scoring_system epss
scoring_elements 0.02616
published_at 2026-04-21T12:55:00Z
7
value 0.00014
scoring_system epss
scoring_elements 0.02522
published_at 2026-04-04T12:55:00Z
8
value 0.00014
scoring_system epss
scoring_elements 0.02524
published_at 2026-04-07T12:55:00Z
9
value 0.00014
scoring_system epss
scoring_elements 0.02528
published_at 2026-04-08T12:55:00Z
10
value 0.00014
scoring_system epss
scoring_elements 0.02549
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-2235
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2192589
reference_id 2192589
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2192589
4
reference_url https://kernel.dance/fd0815f632c24878e325821943edccc7fde947a2
reference_id fd0815f632c24878e325821943edccc7fde947a2
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T18:38:34Z/
url https://kernel.dance/fd0815f632c24878e325821943edccc7fde947a2
5
reference_url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=fd0815f632c24878e325821943edccc7fde947a2
reference_id ?id=fd0815f632c24878e325821943edccc7fde947a2
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T18:38:34Z/
url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=fd0815f632c24878e325821943edccc7fde947a2
6
reference_url https://access.redhat.com/errata/RHSA-2023:3705
reference_id RHSA-2023:3705
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3705
7
reference_url https://access.redhat.com/errata/RHSA-2023:3708
reference_id RHSA-2023:3708
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3708
8
reference_url https://access.redhat.com/errata/RHSA-2023:3723
reference_id RHSA-2023:3723
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3723
9
reference_url https://access.redhat.com/errata/RHSA-2023:4137
reference_id RHSA-2023:4137
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4137
10
reference_url https://access.redhat.com/errata/RHSA-2023:4138
reference_id RHSA-2023:4138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4138
11
reference_url https://access.redhat.com/errata/RHSA-2023:4517
reference_id RHSA-2023:4517
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4517
12
reference_url https://access.redhat.com/errata/RHSA-2023:4541
reference_id RHSA-2023:4541
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4541
13
reference_url https://access.redhat.com/errata/RHSA-2023:5627
reference_id RHSA-2023:5627
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5627
14
reference_url https://usn.ubuntu.com/6175-1/
reference_id USN-6175-1
reference_type
scores
url https://usn.ubuntu.com/6175-1/
15
reference_url https://usn.ubuntu.com/6186-1/
reference_id USN-6186-1
reference_type
scores
url https://usn.ubuntu.com/6186-1/
16
reference_url https://usn.ubuntu.com/6300-1/
reference_id USN-6300-1
reference_type
scores
url https://usn.ubuntu.com/6300-1/
17
reference_url https://usn.ubuntu.com/6311-1/
reference_id USN-6311-1
reference_type
scores
url https://usn.ubuntu.com/6311-1/
18
reference_url https://usn.ubuntu.com/6332-1/
reference_id USN-6332-1
reference_type
scores
url https://usn.ubuntu.com/6332-1/
19
reference_url https://usn.ubuntu.com/6347-1/
reference_id USN-6347-1
reference_type
scores
url https://usn.ubuntu.com/6347-1/
20
reference_url https://usn.ubuntu.com/6385-1/
reference_id USN-6385-1
reference_type
scores
url https://usn.ubuntu.com/6385-1/
fixed_packages
aliases CVE-2023-2235
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zsmq-81fu-q3fq
Fixing_vulnerabilities
Risk_score4.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel-rt@4.18.0-477.21.1.rt7.284%3Farch=el8_8