Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/kernel@4.18.0-372.51.1?arch=el8_6
Typerpm
Namespaceredhat
Namekernel
Version4.18.0-372.51.1
Qualifiers
arch el8_6
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-47d4-8hym-c3g4
vulnerability_id VCID-47d4-8hym-c3g4
summary kernel: x86/fpu: Fix copy_xstate_to_uabi() to copy init states correctly
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50425.json
reference_id
reference_type
scores
0
value 4.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50425.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-50425
reference_id
reference_type
scores
0
value 0.00018
scoring_system epss
scoring_elements 0.04741
published_at 2026-04-02T12:55:00Z
1
value 0.00018
scoring_system epss
scoring_elements 0.04764
published_at 2026-04-04T12:55:00Z
2
value 0.00018
scoring_system epss
scoring_elements 0.04779
published_at 2026-04-07T12:55:00Z
3
value 0.00018
scoring_system epss
scoring_elements 0.04812
published_at 2026-04-11T12:55:00Z
4
value 0.00018
scoring_system epss
scoring_elements 0.04825
published_at 2026-04-09T12:55:00Z
5
value 0.00018
scoring_system epss
scoring_elements 0.0479
published_at 2026-04-12T12:55:00Z
6
value 0.00018
scoring_system epss
scoring_elements 0.04912
published_at 2026-04-24T12:55:00Z
7
value 0.00018
scoring_system epss
scoring_elements 0.04951
published_at 2026-04-26T12:55:00Z
8
value 0.00018
scoring_system epss
scoring_elements 0.0477
published_at 2026-04-13T12:55:00Z
9
value 0.00018
scoring_system epss
scoring_elements 0.04723
published_at 2026-04-16T12:55:00Z
10
value 0.00018
scoring_system epss
scoring_elements 0.04731
published_at 2026-04-18T12:55:00Z
11
value 0.00018
scoring_system epss
scoring_elements 0.04875
published_at 2026-04-21T12:55:00Z
12
value 0.0002
scoring_system epss
scoring_elements 0.05471
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-50425
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2400803
reference_id 2400803
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2400803
4
reference_url https://access.redhat.com/errata/RHSA-2023:1554
reference_id RHSA-2023:1554
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1554
5
reference_url https://access.redhat.com/errata/RHSA-2023:2458
reference_id RHSA-2023:2458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2458
6
reference_url https://access.redhat.com/errata/RHSA-2023:2951
reference_id RHSA-2023:2951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2951
fixed_packages
aliases CVE-2022-50425
risk_score 1.9
exploitability 0.5
weighted_severity 3.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-47d4-8hym-c3g4
1
url VCID-mwwp-mrsw-jqgw
vulnerability_id VCID-mwwp-mrsw-jqgw
summary kernel: FUSE filesystem low-privileged user privileges escalation
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0386.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0386.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-0386
reference_id
reference_type
scores
0
value 0.49157
scoring_system epss
scoring_elements 0.97787
published_at 2026-04-18T12:55:00Z
1
value 0.49157
scoring_system epss
scoring_elements 0.97784
published_at 2026-04-16T12:55:00Z
2
value 0.51056
scoring_system epss
scoring_elements 0.97881
published_at 2026-04-21T12:55:00Z
3
value 0.51992
scoring_system epss
scoring_elements 0.97896
published_at 2026-04-02T12:55:00Z
4
value 0.51992
scoring_system epss
scoring_elements 0.97898
published_at 2026-04-04T12:55:00Z
5
value 0.52388
scoring_system epss
scoring_elements 0.97931
published_at 2026-04-13T12:55:00Z
6
value 0.52388
scoring_system epss
scoring_elements 0.97929
published_at 2026-04-12T12:55:00Z
7
value 0.52388
scoring_system epss
scoring_elements 0.97928
published_at 2026-04-11T12:55:00Z
8
value 0.5298
scoring_system epss
scoring_elements 0.97962
published_at 2026-04-24T12:55:00Z
9
value 0.5298
scoring_system epss
scoring_elements 0.97964
published_at 2026-04-26T12:55:00Z
10
value 0.54224
scoring_system epss
scoring_elements 0.98015
published_at 2026-04-08T12:55:00Z
11
value 0.54322
scoring_system epss
scoring_elements 0.98031
published_at 2026-04-29T12:55:00Z
12
value 0.54874
scoring_system epss
scoring_elements 0.98036
published_at 2026-04-07T12:55:00Z
13
value 0.56414
scoring_system epss
scoring_elements 0.98112
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-0386
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0386
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0386
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31436
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31436
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32233
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32233
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2159505
reference_id 2159505
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2159505
7
reference_url https://www.debian.org/security/2023/dsa-5402
reference_id dsa-5402
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-07-17T03:55:31Z/
url https://www.debian.org/security/2023/dsa-5402
8
reference_url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=4f11ada10d0a
reference_id ?id=4f11ada10d0a
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-07-17T03:55:31Z/
url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=4f11ada10d0a
9
reference_url http://packetstormsecurity.com/files/173087/Kernel-Live-Patch-Security-Notice-LSN-0095-1.html
reference_id Kernel-Live-Patch-Security-Notice-LSN-0095-1.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-07-17T03:55:31Z/
url http://packetstormsecurity.com/files/173087/Kernel-Live-Patch-Security-Notice-LSN-0095-1.html
10
reference_url https://lists.debian.org/debian-lts-announce/2023/06/msg00008.html
reference_id msg00008.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-07-17T03:55:31Z/
url https://lists.debian.org/debian-lts-announce/2023/06/msg00008.html
11
reference_url https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html
reference_id msg00020.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-07-17T03:55:31Z/
url https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html
12
reference_url https://security.netapp.com/advisory/ntap-20230420-0004/
reference_id ntap-20230420-0004
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-07-17T03:55:31Z/
url https://security.netapp.com/advisory/ntap-20230420-0004/
13
reference_url https://access.redhat.com/errata/RHSA-2023:1554
reference_id RHSA-2023:1554
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1554
14
reference_url https://access.redhat.com/errata/RHSA-2023:1566
reference_id RHSA-2023:1566
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1566
15
reference_url https://access.redhat.com/errata/RHSA-2023:1584
reference_id RHSA-2023:1584
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1584
16
reference_url https://access.redhat.com/errata/RHSA-2023:1659
reference_id RHSA-2023:1659
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1659
17
reference_url https://access.redhat.com/errata/RHSA-2023:1660
reference_id RHSA-2023:1660
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1660
18
reference_url https://access.redhat.com/errata/RHSA-2023:1677
reference_id RHSA-2023:1677
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1677
19
reference_url https://access.redhat.com/errata/RHSA-2023:1681
reference_id RHSA-2023:1681
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1681
20
reference_url https://access.redhat.com/errata/RHSA-2023:1691
reference_id RHSA-2023:1691
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1691
21
reference_url https://access.redhat.com/errata/RHSA-2023:1703
reference_id RHSA-2023:1703
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1703
22
reference_url https://access.redhat.com/errata/RHSA-2023:1970
reference_id RHSA-2023:1970
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1970
23
reference_url https://access.redhat.com/errata/RHSA-2023:1980
reference_id RHSA-2023:1980
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1980
24
reference_url https://access.redhat.com/errata/RHSA-2023:1984
reference_id RHSA-2023:1984
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1984
25
reference_url https://usn.ubuntu.com/6025-1/
reference_id USN-6025-1
reference_type
scores
url https://usn.ubuntu.com/6025-1/
26
reference_url https://usn.ubuntu.com/6040-1/
reference_id USN-6040-1
reference_type
scores
url https://usn.ubuntu.com/6040-1/
27
reference_url https://usn.ubuntu.com/6043-1/
reference_id USN-6043-1
reference_type
scores
url https://usn.ubuntu.com/6043-1/
28
reference_url https://usn.ubuntu.com/6057-1/
reference_id USN-6057-1
reference_type
scores
url https://usn.ubuntu.com/6057-1/
29
reference_url https://usn.ubuntu.com/6071-1/
reference_id USN-6071-1
reference_type
scores
url https://usn.ubuntu.com/6071-1/
30
reference_url https://usn.ubuntu.com/6072-1/
reference_id USN-6072-1
reference_type
scores
url https://usn.ubuntu.com/6072-1/
31
reference_url https://usn.ubuntu.com/6134-1/
reference_id USN-6134-1
reference_type
scores
url https://usn.ubuntu.com/6134-1/
fixed_packages
aliases CVE-2023-0386
risk_score 10.0
exploitability 2.0
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mwwp-mrsw-jqgw
2
url VCID-r4pv-ac7b-aufb
vulnerability_id VCID-r4pv-ac7b-aufb
summary ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0266.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0266.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-0266
reference_id
reference_type
scores
0
value 0.00097
scoring_system epss
scoring_elements 0.26922
published_at 2026-04-02T12:55:00Z
1
value 0.00097
scoring_system epss
scoring_elements 0.26864
published_at 2026-04-09T12:55:00Z
2
value 0.00097
scoring_system epss
scoring_elements 0.26816
published_at 2026-04-08T12:55:00Z
3
value 0.00097
scoring_system epss
scoring_elements 0.26747
published_at 2026-04-07T12:55:00Z
4
value 0.00097
scoring_system epss
scoring_elements 0.26958
published_at 2026-04-04T12:55:00Z
5
value 0.00153
scoring_system epss
scoring_elements 0.35602
published_at 2026-04-29T12:55:00Z
6
value 0.00158
scoring_system epss
scoring_elements 0.36571
published_at 2026-04-21T12:55:00Z
7
value 0.00158
scoring_system epss
scoring_elements 0.36317
published_at 2026-04-26T12:55:00Z
8
value 0.00158
scoring_system epss
scoring_elements 0.36347
published_at 2026-04-24T12:55:00Z
9
value 0.00158
scoring_system epss
scoring_elements 0.36662
published_at 2026-04-11T12:55:00Z
10
value 0.00158
scoring_system epss
scoring_elements 0.36627
published_at 2026-04-12T12:55:00Z
11
value 0.00158
scoring_system epss
scoring_elements 0.36602
published_at 2026-04-13T12:55:00Z
12
value 0.00158
scoring_system epss
scoring_elements 0.36648
published_at 2026-04-16T12:55:00Z
13
value 0.00158
scoring_system epss
scoring_elements 0.3663
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-0266
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2873
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2873
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3545
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3545
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3623
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3623
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36280
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36280
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41218
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41218
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45934
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45934
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4696
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4696
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47929
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47929
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0179
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0179
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0266
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0266
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0394
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0394
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23454
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23454
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23455
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23455
15
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2163379
reference_id 2163379
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2163379
17
reference_url https://github.com/torvalds/linux/commit/56b88b50565cd8b946a2d00b0c83927b7ebb055e
reference_id 56b88b50565cd8b946a2d00b0c83927b7ebb055e
reference_type
scores
0
value 7.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:L/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T15:07:49Z/
url https://github.com/torvalds/linux/commit/56b88b50565cd8b946a2d00b0c83927b7ebb055e
18
reference_url https://git.kernel.org/pub/scm/linux/kernel/git/stable/stable-queue.git/tree/queue-5.10/alsa-pcm-move-rwsem-lock-inside-snd_ctl_elem_read-to-prevent-uaf.patch?id=72783cf35e6c55bca84c4bb7b776c58152856fd4
reference_id alsa-pcm-move-rwsem-lock-inside-snd_ctl_elem_read-to-prevent-uaf.patch?id=72783cf35e6c55bca84c4bb7b776c58152856fd4
reference_type
scores
0
value 7.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:L/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T15:07:49Z/
url https://git.kernel.org/pub/scm/linux/kernel/git/stable/stable-queue.git/tree/queue-5.10/alsa-pcm-move-rwsem-lock-inside-snd_ctl_elem_read-to-prevent-uaf.patch?id=72783cf35e6c55bca84c4bb7b776c58152856fd4
19
reference_url https://security.archlinux.org/AVG-2834
reference_id AVG-2834
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2834
20
reference_url https://security.archlinux.org/AVG-2835
reference_id AVG-2835
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2835
21
reference_url https://security.archlinux.org/AVG-2836
reference_id AVG-2836
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2836
22
reference_url https://security.archlinux.org/AVG-2837
reference_id AVG-2837
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2837
23
reference_url https://github.com/torvalds/linux/commit/becf9e5d553c2389d857a3c178ce80fdb34a02e1
reference_id becf9e5d553c2389d857a3c178ce80fdb34a02e1
reference_type
scores
0
value 7.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:L/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T15:07:49Z/
url https://github.com/torvalds/linux/commit/becf9e5d553c2389d857a3c178ce80fdb34a02e1
24
reference_url https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html
reference_id msg00006.html
reference_type
scores
0
value 7.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:L/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T15:07:49Z/
url https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html
25
reference_url https://access.redhat.com/errata/RHSA-2023:1202
reference_id RHSA-2023:1202
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1202
26
reference_url https://access.redhat.com/errata/RHSA-2023:1203
reference_id RHSA-2023:1203
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1203
27
reference_url https://access.redhat.com/errata/RHSA-2023:1435
reference_id RHSA-2023:1435
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1435
28
reference_url https://access.redhat.com/errata/RHSA-2023:1469
reference_id RHSA-2023:1469
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1469
29
reference_url https://access.redhat.com/errata/RHSA-2023:1470
reference_id RHSA-2023:1470
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1470
30
reference_url https://access.redhat.com/errata/RHSA-2023:1471
reference_id RHSA-2023:1471
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1471
31
reference_url https://access.redhat.com/errata/RHSA-2023:1554
reference_id RHSA-2023:1554
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1554
32
reference_url https://access.redhat.com/errata/RHSA-2023:1556
reference_id RHSA-2023:1556
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1556
33
reference_url https://access.redhat.com/errata/RHSA-2023:1557
reference_id RHSA-2023:1557
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1557
34
reference_url https://access.redhat.com/errata/RHSA-2023:1559
reference_id RHSA-2023:1559
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1559
35
reference_url https://access.redhat.com/errata/RHSA-2023:1560
reference_id RHSA-2023:1560
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1560
36
reference_url https://access.redhat.com/errata/RHSA-2023:1566
reference_id RHSA-2023:1566
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1566
37
reference_url https://access.redhat.com/errata/RHSA-2023:1584
reference_id RHSA-2023:1584
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1584
38
reference_url https://access.redhat.com/errata/RHSA-2023:1588
reference_id RHSA-2023:1588
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1588
39
reference_url https://access.redhat.com/errata/RHSA-2023:1590
reference_id RHSA-2023:1590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1590
40
reference_url https://access.redhat.com/errata/RHSA-2023:1659
reference_id RHSA-2023:1659
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1659
41
reference_url https://access.redhat.com/errata/RHSA-2023:1660
reference_id RHSA-2023:1660
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1660
42
reference_url https://access.redhat.com/errata/RHSA-2023:1662
reference_id RHSA-2023:1662
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1662
43
reference_url https://access.redhat.com/errata/RHSA-2023:1666
reference_id RHSA-2023:1666
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1666
44
reference_url https://access.redhat.com/errata/RHSA-2023:1677
reference_id RHSA-2023:1677
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1677
45
reference_url https://usn.ubuntu.com/5915-1/
reference_id USN-5915-1
reference_type
scores
url https://usn.ubuntu.com/5915-1/
46
reference_url https://usn.ubuntu.com/5917-1/
reference_id USN-5917-1
reference_type
scores
url https://usn.ubuntu.com/5917-1/
47
reference_url https://usn.ubuntu.com/5924-1/
reference_id USN-5924-1
reference_type
scores
url https://usn.ubuntu.com/5924-1/
48
reference_url https://usn.ubuntu.com/5927-1/
reference_id USN-5927-1
reference_type
scores
url https://usn.ubuntu.com/5927-1/
49
reference_url https://usn.ubuntu.com/5934-1/
reference_id USN-5934-1
reference_type
scores
url https://usn.ubuntu.com/5934-1/
50
reference_url https://usn.ubuntu.com/5939-1/
reference_id USN-5939-1
reference_type
scores
url https://usn.ubuntu.com/5939-1/
51
reference_url https://usn.ubuntu.com/5940-1/
reference_id USN-5940-1
reference_type
scores
url https://usn.ubuntu.com/5940-1/
52
reference_url https://usn.ubuntu.com/5951-1/
reference_id USN-5951-1
reference_type
scores
url https://usn.ubuntu.com/5951-1/
53
reference_url https://usn.ubuntu.com/5970-1/
reference_id USN-5970-1
reference_type
scores
url https://usn.ubuntu.com/5970-1/
54
reference_url https://usn.ubuntu.com/5975-1/
reference_id USN-5975-1
reference_type
scores
url https://usn.ubuntu.com/5975-1/
55
reference_url https://usn.ubuntu.com/5979-1/
reference_id USN-5979-1
reference_type
scores
url https://usn.ubuntu.com/5979-1/
56
reference_url https://usn.ubuntu.com/5981-1/
reference_id USN-5981-1
reference_type
scores
url https://usn.ubuntu.com/5981-1/
57
reference_url https://usn.ubuntu.com/5982-1/
reference_id USN-5982-1
reference_type
scores
url https://usn.ubuntu.com/5982-1/
58
reference_url https://usn.ubuntu.com/5984-1/
reference_id USN-5984-1
reference_type
scores
url https://usn.ubuntu.com/5984-1/
59
reference_url https://usn.ubuntu.com/5987-1/
reference_id USN-5987-1
reference_type
scores
url https://usn.ubuntu.com/5987-1/
60
reference_url https://usn.ubuntu.com/5991-1/
reference_id USN-5991-1
reference_type
scores
url https://usn.ubuntu.com/5991-1/
61
reference_url https://usn.ubuntu.com/6000-1/
reference_id USN-6000-1
reference_type
scores
url https://usn.ubuntu.com/6000-1/
62
reference_url https://usn.ubuntu.com/6004-1/
reference_id USN-6004-1
reference_type
scores
url https://usn.ubuntu.com/6004-1/
63
reference_url https://usn.ubuntu.com/6009-1/
reference_id USN-6009-1
reference_type
scores
url https://usn.ubuntu.com/6009-1/
64
reference_url https://usn.ubuntu.com/6030-1/
reference_id USN-6030-1
reference_type
scores
url https://usn.ubuntu.com/6030-1/
fixed_packages
aliases CVE-2023-0266
risk_score 10.0
exploitability 2.0
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-r4pv-ac7b-aufb
Fixing_vulnerabilities
Risk_score10.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@4.18.0-372.51.1%3Farch=el8_6