Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/1067254?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/1067254?format=api", "purl": "pkg:deb/debian/linux@6.19.12-1", "type": "deb", "namespace": "debian", "name": "linux", "version": "6.19.12-1", "qualifiers": {}, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": "6.19.13-1~bpo13+1", "latest_non_vulnerable_version": "7.0-1~exp1", "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78028?format=api", "vulnerability_id": "VCID-dq8r-defv-hbg6", "summary": "kernel: nvme: memory corruption via unprivileged user passthrough", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6238.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6238.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-6238", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.03092", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.02981", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.03063", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.03058", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.03048", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.02996", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.02785", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.02789", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.02809", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.0278", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.02761", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.02757", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.02742", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.02754", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-6238" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2250834", "reference_id": "2250834", "reference_type": "", "scores": [ { "value": "6.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T17:15:22Z/" } ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2250834" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6", "reference_id": "cpe:/o:redhat:enterprise_linux:6", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7", "reference_id": "cpe:/o:redhat:enterprise_linux:7", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8", "reference_id": "cpe:/o:redhat:enterprise_linux:8", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9", "reference_id": "cpe:/o:redhat:enterprise_linux:9", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9" }, { "reference_url": "https://access.redhat.com/security/cve/CVE-2023-6238", "reference_id": "CVE-2023-6238", "reference_type": "", "scores": [ { "value": "6.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T17:15:22Z/" } ], "url": "https://access.redhat.com/security/cve/CVE-2023-6238" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1088969?format=api", "purl": "pkg:deb/debian/linux@6.19.13-1~bpo13%2B1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.13-1~bpo13%252B1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1068119?format=api", "purl": "pkg:deb/debian/linux@6.19.13-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-11nd-2f5c-ybe1" }, { "vulnerability": "VCID-1n41-qg8u-r7d5" }, { "vulnerability": "VCID-22zu-qy6y-aub1" }, { "vulnerability": "VCID-25at-2je8-2ufj" }, { "vulnerability": "VCID-2cky-e16g-yqgf" }, { "vulnerability": "VCID-2dp8-mmkf-w7dx" }, { "vulnerability": "VCID-31cj-5nhu-4qa9" }, { "vulnerability": "VCID-3mhu-519z-pbck" }, { "vulnerability": "VCID-3qmn-b1w4-jkg4" }, { "vulnerability": "VCID-3r34-452w-skc2" }, { "vulnerability": "VCID-46pr-2cfb-mbhn" }, { "vulnerability": "VCID-4e1f-qvnx-87fc" }, { "vulnerability": "VCID-4v3t-8s2w-rfbg" }, { "vulnerability": "VCID-5vkh-dbsm-vbgu" }, { "vulnerability": "VCID-656s-tkaz-m7bj" }, { "vulnerability": "VCID-6vtw-v3u5-buce" }, { "vulnerability": "VCID-878n-d9ss-rugc" }, { "vulnerability": "VCID-8v51-tdqe-tbcp" }, { "vulnerability": "VCID-9bru-3rtm-sfey" }, { "vulnerability": "VCID-9rrq-d3g4-jyfy" }, { "vulnerability": "VCID-9wsp-xbm7-yfb9" }, { "vulnerability": "VCID-a454-61sh-j7ay" }, { "vulnerability": "VCID-cc41-mkuk-2fgu" }, { "vulnerability": "VCID-dq8r-defv-hbg6" }, { "vulnerability": "VCID-dqu3-2d1w-bked" }, { "vulnerability": "VCID-dwp4-mc1w-4bcw" }, { "vulnerability": "VCID-emnd-q69n-a3fe" }, { "vulnerability": "VCID-euxu-gjpw-8yhs" }, { "vulnerability": "VCID-f5xb-v8j6-nye2" }, { "vulnerability": "VCID-fhfz-6h5m-hbed" }, { "vulnerability": "VCID-g9zj-fsa9-vkca" }, { "vulnerability": "VCID-gr5a-eqvx-n3ha" }, { "vulnerability": "VCID-hbnp-yx9t-bbfj" }, { "vulnerability": "VCID-hhxy-swz4-eqfy" }, { "vulnerability": "VCID-jset-t9qq-xfah" }, { "vulnerability": "VCID-jyxp-bjx8-kfbd" }, { "vulnerability": "VCID-ka1g-skuq-gqcs" }, { "vulnerability": "VCID-kvq6-38sd-77h7" }, { "vulnerability": "VCID-kw1q-k8cm-j7dj" }, { "vulnerability": "VCID-n59e-jkf6-13bf" }, { "vulnerability": "VCID-n99v-8wyx-a3cr" }, { "vulnerability": "VCID-nw2n-9b59-gbdm" }, { "vulnerability": "VCID-p1xn-hbgr-efby" }, { "vulnerability": "VCID-p3vt-v7gj-gqbc" }, { "vulnerability": "VCID-pest-xjma-sfbn" }, { "vulnerability": "VCID-pgrh-f1dv-27dh" }, { "vulnerability": "VCID-pj46-9jp7-33ha" }, { "vulnerability": "VCID-r4kz-m7m8-c3b2" }, { "vulnerability": "VCID-ruxz-24k9-sbcf" }, { "vulnerability": "VCID-sqkd-cwbk-tkec" }, { "vulnerability": "VCID-szq9-t587-83h2" }, { "vulnerability": "VCID-tafy-p8yj-ukdv" }, { "vulnerability": "VCID-than-1kz8-yucx" }, { "vulnerability": "VCID-tz5h-hd3e-rbbv" }, { "vulnerability": "VCID-uvrh-s5dy-puc5" }, { "vulnerability": "VCID-uyug-vjrw-87h6" }, { "vulnerability": "VCID-uzrt-axb3-qfcs" }, { "vulnerability": "VCID-vx8c-nssy-ubaj" }, { "vulnerability": "VCID-vzyy-16xe-qkgm" }, { "vulnerability": "VCID-w8d1-9zry-wydv" }, { "vulnerability": "VCID-wvu1-rfc1-zya9" }, { "vulnerability": "VCID-x9wt-jmne-vudk" }, { "vulnerability": "VCID-y54q-e569-p7cx" }, { "vulnerability": "VCID-yahm-29wh-z3e9" }, { "vulnerability": "VCID-yj9c-fda5-57g2" }, { "vulnerability": "VCID-zgb6-kq8s-w3dm" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.13-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1077786?format=api", "purl": "pkg:deb/debian/linux@6.19.14-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-dq8r-defv-hbg6" }, { "vulnerability": "VCID-n59e-jkf6-13bf" }, { "vulnerability": "VCID-p3vt-v7gj-gqbc" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.14-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1067255?format=api", "purl": "pkg:deb/debian/linux@7.0-1~exp1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@7.0-1~exp1" } ], "aliases": [ "CVE-2023-6238" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "6.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dq8r-defv-hbg6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79006?format=api", "vulnerability_id": "VCID-n59e-jkf6-13bf", "summary": "kernel: ntfs3 local privledge escalation if NTFS character set and remount and umount called simultaneously", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3238.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3238.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-3238", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0008", "scoring_system": "epss", "scoring_elements": "0.23708", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0008", "scoring_system": "epss", "scoring_elements": "0.23336", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0008", "scoring_system": "epss", "scoring_elements": "0.23547", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0008", "scoring_system": "epss", "scoring_elements": "0.23364", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0008", "scoring_system": "epss", "scoring_elements": "0.23353", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0008", "scoring_system": "epss", "scoring_elements": "0.23751", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0008", "scoring_system": "epss", "scoring_elements": "0.23531", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0008", "scoring_system": "epss", "scoring_elements": "0.23602", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0008", "scoring_system": "epss", "scoring_elements": "0.23648", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0008", "scoring_system": "epss", "scoring_elements": "0.23664", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0008", "scoring_system": "epss", "scoring_elements": "0.23622", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0008", "scoring_system": "epss", "scoring_elements": "0.23565", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0008", "scoring_system": "epss", "scoring_elements": "0.23577", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0008", "scoring_system": "epss", "scoring_elements": "0.23567", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-3238" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2127927", "reference_id": "2127927", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-01T13:32:12Z/" } ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2127927" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1088969?format=api", "purl": "pkg:deb/debian/linux@6.19.13-1~bpo13%2B1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.13-1~bpo13%252B1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1068119?format=api", "purl": "pkg:deb/debian/linux@6.19.13-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-11nd-2f5c-ybe1" }, { "vulnerability": "VCID-1n41-qg8u-r7d5" }, { "vulnerability": "VCID-22zu-qy6y-aub1" }, { "vulnerability": "VCID-25at-2je8-2ufj" }, { "vulnerability": "VCID-2cky-e16g-yqgf" }, { "vulnerability": "VCID-2dp8-mmkf-w7dx" }, { "vulnerability": "VCID-31cj-5nhu-4qa9" }, { "vulnerability": "VCID-3mhu-519z-pbck" }, { "vulnerability": "VCID-3qmn-b1w4-jkg4" }, { "vulnerability": "VCID-3r34-452w-skc2" }, { "vulnerability": "VCID-46pr-2cfb-mbhn" }, { "vulnerability": "VCID-4e1f-qvnx-87fc" }, { "vulnerability": "VCID-4v3t-8s2w-rfbg" }, { "vulnerability": "VCID-5vkh-dbsm-vbgu" }, { "vulnerability": "VCID-656s-tkaz-m7bj" }, { "vulnerability": "VCID-6vtw-v3u5-buce" }, { "vulnerability": "VCID-878n-d9ss-rugc" }, { "vulnerability": "VCID-8v51-tdqe-tbcp" }, { "vulnerability": "VCID-9bru-3rtm-sfey" }, { "vulnerability": "VCID-9rrq-d3g4-jyfy" }, { "vulnerability": "VCID-9wsp-xbm7-yfb9" }, { "vulnerability": "VCID-a454-61sh-j7ay" }, { "vulnerability": "VCID-cc41-mkuk-2fgu" }, { "vulnerability": "VCID-dq8r-defv-hbg6" }, { "vulnerability": "VCID-dqu3-2d1w-bked" }, { "vulnerability": "VCID-dwp4-mc1w-4bcw" }, { "vulnerability": "VCID-emnd-q69n-a3fe" }, { "vulnerability": "VCID-euxu-gjpw-8yhs" }, { "vulnerability": "VCID-f5xb-v8j6-nye2" }, { "vulnerability": "VCID-fhfz-6h5m-hbed" }, { "vulnerability": "VCID-g9zj-fsa9-vkca" }, { "vulnerability": "VCID-gr5a-eqvx-n3ha" }, { "vulnerability": "VCID-hbnp-yx9t-bbfj" }, { "vulnerability": "VCID-hhxy-swz4-eqfy" }, { "vulnerability": "VCID-jset-t9qq-xfah" }, { "vulnerability": "VCID-jyxp-bjx8-kfbd" }, { "vulnerability": "VCID-ka1g-skuq-gqcs" }, { "vulnerability": "VCID-kvq6-38sd-77h7" }, { "vulnerability": "VCID-kw1q-k8cm-j7dj" }, { "vulnerability": "VCID-n59e-jkf6-13bf" }, { "vulnerability": "VCID-n99v-8wyx-a3cr" }, { "vulnerability": "VCID-nw2n-9b59-gbdm" }, { "vulnerability": "VCID-p1xn-hbgr-efby" }, { "vulnerability": "VCID-p3vt-v7gj-gqbc" }, { "vulnerability": "VCID-pest-xjma-sfbn" }, { "vulnerability": "VCID-pgrh-f1dv-27dh" }, { "vulnerability": "VCID-pj46-9jp7-33ha" }, { "vulnerability": "VCID-r4kz-m7m8-c3b2" }, { "vulnerability": "VCID-ruxz-24k9-sbcf" }, { "vulnerability": "VCID-sqkd-cwbk-tkec" }, { "vulnerability": "VCID-szq9-t587-83h2" }, { "vulnerability": "VCID-tafy-p8yj-ukdv" }, { "vulnerability": "VCID-than-1kz8-yucx" }, { "vulnerability": "VCID-tz5h-hd3e-rbbv" }, { "vulnerability": "VCID-uvrh-s5dy-puc5" }, { "vulnerability": "VCID-uyug-vjrw-87h6" }, { "vulnerability": "VCID-uzrt-axb3-qfcs" }, { "vulnerability": "VCID-vx8c-nssy-ubaj" }, { "vulnerability": "VCID-vzyy-16xe-qkgm" }, { "vulnerability": "VCID-w8d1-9zry-wydv" }, { "vulnerability": "VCID-wvu1-rfc1-zya9" }, { "vulnerability": "VCID-x9wt-jmne-vudk" }, { "vulnerability": "VCID-y54q-e569-p7cx" }, { "vulnerability": "VCID-yahm-29wh-z3e9" }, { "vulnerability": "VCID-yj9c-fda5-57g2" }, { "vulnerability": "VCID-zgb6-kq8s-w3dm" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.13-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1077786?format=api", "purl": "pkg:deb/debian/linux@6.19.14-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-dq8r-defv-hbg6" }, { "vulnerability": "VCID-n59e-jkf6-13bf" }, { "vulnerability": "VCID-p3vt-v7gj-gqbc" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.14-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1067255?format=api", "purl": "pkg:deb/debian/linux@7.0-1~exp1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@7.0-1~exp1" } ], "aliases": [ "CVE-2022-3238" ], "risk_score": 3.5, "exploitability": "0.5", "weighted_severity": "7.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-n59e-jkf6-13bf" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/72268?format=api", "vulnerability_id": "VCID-p3vt-v7gj-gqbc", "summary": "kernel: io_uring: check if iowq is killed before queuing", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-56709.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-56709.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-56709", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09407", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09275", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09424", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09479", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09446", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.10993", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.10994", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.10962", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.10803", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.10939", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.10977", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.11039", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.10863", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-56709" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56709", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56709" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2334795", "reference_id": "2334795", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2334795" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:20518", "reference_id": "RHSA-2025:20518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:20518" }, { "reference_url": "https://usn.ubuntu.com/7379-1/", "reference_id": "USN-7379-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7379-1/" }, { "reference_url": "https://usn.ubuntu.com/7379-2/", "reference_id": "USN-7379-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7379-2/" }, { "reference_url": "https://usn.ubuntu.com/7380-1/", "reference_id": "USN-7380-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7380-1/" }, { "reference_url": "https://usn.ubuntu.com/7381-1/", "reference_id": "USN-7381-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7381-1/" }, { "reference_url": "https://usn.ubuntu.com/7382-1/", "reference_id": "USN-7382-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7382-1/" }, { "reference_url": "https://usn.ubuntu.com/7513-1/", "reference_id": "USN-7513-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7513-1/" }, { "reference_url": "https://usn.ubuntu.com/7513-2/", "reference_id": "USN-7513-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7513-2/" }, { "reference_url": "https://usn.ubuntu.com/7513-3/", "reference_id": "USN-7513-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7513-3/" }, { "reference_url": "https://usn.ubuntu.com/7513-4/", "reference_id": "USN-7513-4", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7513-4/" }, { "reference_url": "https://usn.ubuntu.com/7513-5/", "reference_id": "USN-7513-5", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7513-5/" }, { "reference_url": "https://usn.ubuntu.com/7514-1/", "reference_id": "USN-7514-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7514-1/" }, { "reference_url": "https://usn.ubuntu.com/7515-1/", "reference_id": "USN-7515-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7515-1/" }, { "reference_url": "https://usn.ubuntu.com/7515-2/", "reference_id": "USN-7515-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7515-2/" }, { "reference_url": "https://usn.ubuntu.com/7522-1/", "reference_id": "USN-7522-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7522-1/" }, { "reference_url": "https://usn.ubuntu.com/7523-1/", "reference_id": "USN-7523-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7523-1/" }, { "reference_url": "https://usn.ubuntu.com/7524-1/", "reference_id": "USN-7524-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7524-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1088969?format=api", "purl": "pkg:deb/debian/linux@6.19.13-1~bpo13%2B1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.13-1~bpo13%252B1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1068119?format=api", "purl": "pkg:deb/debian/linux@6.19.13-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-11nd-2f5c-ybe1" }, { "vulnerability": "VCID-1n41-qg8u-r7d5" }, { "vulnerability": "VCID-22zu-qy6y-aub1" }, { "vulnerability": "VCID-25at-2je8-2ufj" }, { "vulnerability": "VCID-2cky-e16g-yqgf" }, { "vulnerability": "VCID-2dp8-mmkf-w7dx" }, { "vulnerability": "VCID-31cj-5nhu-4qa9" }, { "vulnerability": "VCID-3mhu-519z-pbck" }, { "vulnerability": "VCID-3qmn-b1w4-jkg4" }, { "vulnerability": "VCID-3r34-452w-skc2" }, { "vulnerability": "VCID-46pr-2cfb-mbhn" }, { "vulnerability": "VCID-4e1f-qvnx-87fc" }, { "vulnerability": "VCID-4v3t-8s2w-rfbg" }, { "vulnerability": "VCID-5vkh-dbsm-vbgu" }, { "vulnerability": "VCID-656s-tkaz-m7bj" }, { "vulnerability": "VCID-6vtw-v3u5-buce" }, { "vulnerability": "VCID-878n-d9ss-rugc" }, { "vulnerability": "VCID-8v51-tdqe-tbcp" }, { "vulnerability": "VCID-9bru-3rtm-sfey" }, { "vulnerability": "VCID-9rrq-d3g4-jyfy" }, { "vulnerability": "VCID-9wsp-xbm7-yfb9" }, { "vulnerability": "VCID-a454-61sh-j7ay" }, { "vulnerability": "VCID-cc41-mkuk-2fgu" }, { "vulnerability": "VCID-dq8r-defv-hbg6" }, { "vulnerability": "VCID-dqu3-2d1w-bked" }, { "vulnerability": "VCID-dwp4-mc1w-4bcw" }, { "vulnerability": "VCID-emnd-q69n-a3fe" }, { "vulnerability": "VCID-euxu-gjpw-8yhs" }, { "vulnerability": "VCID-f5xb-v8j6-nye2" }, { "vulnerability": "VCID-fhfz-6h5m-hbed" }, { "vulnerability": "VCID-g9zj-fsa9-vkca" }, { "vulnerability": "VCID-gr5a-eqvx-n3ha" }, { "vulnerability": "VCID-hbnp-yx9t-bbfj" }, { "vulnerability": "VCID-hhxy-swz4-eqfy" }, { "vulnerability": "VCID-jset-t9qq-xfah" }, { "vulnerability": "VCID-jyxp-bjx8-kfbd" }, { "vulnerability": "VCID-ka1g-skuq-gqcs" }, { "vulnerability": "VCID-kvq6-38sd-77h7" }, { "vulnerability": "VCID-kw1q-k8cm-j7dj" }, { "vulnerability": "VCID-n59e-jkf6-13bf" }, { "vulnerability": "VCID-n99v-8wyx-a3cr" }, { "vulnerability": "VCID-nw2n-9b59-gbdm" }, { "vulnerability": "VCID-p1xn-hbgr-efby" }, { "vulnerability": "VCID-p3vt-v7gj-gqbc" }, { "vulnerability": "VCID-pest-xjma-sfbn" }, { "vulnerability": "VCID-pgrh-f1dv-27dh" }, { "vulnerability": "VCID-pj46-9jp7-33ha" }, { "vulnerability": "VCID-r4kz-m7m8-c3b2" }, { "vulnerability": "VCID-ruxz-24k9-sbcf" }, { "vulnerability": "VCID-sqkd-cwbk-tkec" }, { "vulnerability": "VCID-szq9-t587-83h2" }, { "vulnerability": "VCID-tafy-p8yj-ukdv" }, { "vulnerability": "VCID-than-1kz8-yucx" }, { "vulnerability": "VCID-tz5h-hd3e-rbbv" }, { "vulnerability": "VCID-uvrh-s5dy-puc5" }, { "vulnerability": "VCID-uyug-vjrw-87h6" }, { "vulnerability": "VCID-uzrt-axb3-qfcs" }, { "vulnerability": "VCID-vx8c-nssy-ubaj" }, { "vulnerability": "VCID-vzyy-16xe-qkgm" }, { "vulnerability": "VCID-w8d1-9zry-wydv" }, { "vulnerability": "VCID-wvu1-rfc1-zya9" }, { "vulnerability": "VCID-x9wt-jmne-vudk" }, { "vulnerability": "VCID-y54q-e569-p7cx" }, { "vulnerability": "VCID-yahm-29wh-z3e9" }, { "vulnerability": "VCID-yj9c-fda5-57g2" }, { "vulnerability": "VCID-zgb6-kq8s-w3dm" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.13-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1077786?format=api", "purl": "pkg:deb/debian/linux@6.19.14-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-dq8r-defv-hbg6" }, { "vulnerability": "VCID-n59e-jkf6-13bf" }, { "vulnerability": "VCID-p3vt-v7gj-gqbc" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.14-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1067255?format=api", "purl": "pkg:deb/debian/linux@7.0-1~exp1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@7.0-1~exp1" } ], "aliases": [ "CVE-2024-56709" ], "risk_score": 2.0, "exploitability": "0.5", "weighted_severity": "4.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-p3vt-v7gj-gqbc" } ], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/351716?format=api", "vulnerability_id": "VCID-1g77-qwuy-nkg8", "summary": "", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31416.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31416.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31416", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06618", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.0661", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09229", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09201", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09252", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09294", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31416" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31416", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31416" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2457825", "reference_id": "2457825", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2457825" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994366?format=api", "purl": "pkg:deb/debian/linux@6.1.4-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.1.4-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/994368?format=api", "purl": "pkg:deb/debian/linux@6.1.162-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.1.162-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/994375?format=api", "purl": "pkg:deb/debian/linux@6.12.74-2~bpo12%2B1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.12.74-2~bpo12%252B1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1067254?format=api", "purl": "pkg:deb/debian/linux@6.19.12-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-dq8r-defv-hbg6" }, { "vulnerability": "VCID-n59e-jkf6-13bf" }, { "vulnerability": "VCID-p3vt-v7gj-gqbc" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.12-1" } ], "aliases": [ "CVE-2026-31416" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1g77-qwuy-nkg8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/351717?format=api", "vulnerability_id": "VCID-1s77-djzb-xffp", "summary": "", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31417.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31417.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31417", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.0661", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06618", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09252", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09294", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09229", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00068", "scoring_system": "epss", "scoring_elements": "0.20753", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31417" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31417", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31417" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2457837", "reference_id": "2457837", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2457837" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994366?format=api", "purl": "pkg:deb/debian/linux@6.1.4-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.1.4-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/994368?format=api", "purl": "pkg:deb/debian/linux@6.1.162-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.1.162-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/994375?format=api", "purl": "pkg:deb/debian/linux@6.12.74-2~bpo12%2B1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.12.74-2~bpo12%252B1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1067254?format=api", "purl": "pkg:deb/debian/linux@6.19.12-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-dq8r-defv-hbg6" }, { "vulnerability": "VCID-n59e-jkf6-13bf" }, { "vulnerability": "VCID-p3vt-v7gj-gqbc" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.12-1" } ], "aliases": [ "CVE-2026-31417" ], "risk_score": 1.5, "exploitability": "0.5", "weighted_severity": "3.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1s77-djzb-xffp" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/351723?format=api", "vulnerability_id": "VCID-4jvb-unxd-3qg3", "summary": "", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31423.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31423.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31423", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06618", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.0661", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09229", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09201", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09252", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09294", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31423" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31423", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31423" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2457839", "reference_id": "2457839", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2457839" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994366?format=api", "purl": "pkg:deb/debian/linux@6.1.4-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.1.4-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/994368?format=api", "purl": "pkg:deb/debian/linux@6.1.162-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.1.162-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/994375?format=api", "purl": "pkg:deb/debian/linux@6.12.74-2~bpo12%2B1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.12.74-2~bpo12%252B1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1067254?format=api", "purl": "pkg:deb/debian/linux@6.19.12-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-dq8r-defv-hbg6" }, { "vulnerability": "VCID-n59e-jkf6-13bf" }, { "vulnerability": "VCID-p3vt-v7gj-gqbc" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.12-1" } ], "aliases": [ "CVE-2026-31423" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4jvb-unxd-3qg3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/351720?format=api", "vulnerability_id": "VCID-5ahq-saw1-suf1", "summary": "", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31420.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31420.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31420", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05673", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05662", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00028", "scoring_system": "epss", "scoring_elements": "0.0789", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00028", "scoring_system": "epss", "scoring_elements": "0.07792", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00028", "scoring_system": "epss", "scoring_elements": "0.07846", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00028", "scoring_system": "epss", "scoring_elements": "0.07813", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31420" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31420", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31420" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2457838", "reference_id": "2457838", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2457838" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994366?format=api", "purl": "pkg:deb/debian/linux@6.1.4-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.1.4-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/994368?format=api", "purl": "pkg:deb/debian/linux@6.1.162-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.1.162-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/994375?format=api", "purl": "pkg:deb/debian/linux@6.12.74-2~bpo12%2B1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.12.74-2~bpo12%252B1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1067254?format=api", "purl": "pkg:deb/debian/linux@6.19.12-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-dq8r-defv-hbg6" }, { "vulnerability": "VCID-n59e-jkf6-13bf" }, { "vulnerability": "VCID-p3vt-v7gj-gqbc" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.12-1" } ], "aliases": [ "CVE-2026-31420" ], "risk_score": 1.4, "exploitability": "0.5", "weighted_severity": "2.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5ahq-saw1-suf1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/351721?format=api", "vulnerability_id": "VCID-94k1-ja9w-2fd2", "summary": "", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31421.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31421.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31421", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06618", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.0661", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09229", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09201", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09252", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09294", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31421" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31421", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31421" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2457824", "reference_id": "2457824", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2457824" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994366?format=api", "purl": "pkg:deb/debian/linux@6.1.4-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.1.4-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/994368?format=api", "purl": "pkg:deb/debian/linux@6.1.162-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.1.162-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/994375?format=api", "purl": "pkg:deb/debian/linux@6.12.74-2~bpo12%2B1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.12.74-2~bpo12%252B1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1067254?format=api", "purl": "pkg:deb/debian/linux@6.19.12-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-dq8r-defv-hbg6" }, { "vulnerability": "VCID-n59e-jkf6-13bf" }, { "vulnerability": "VCID-p3vt-v7gj-gqbc" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.12-1" } ], "aliases": [ "CVE-2026-31421" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-94k1-ja9w-2fd2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/353938?format=api", "vulnerability_id": "VCID-brte-gqy3-r3ax", "summary": "In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix OOB write in QUERY_INFO for compound requests When a compound request such as READ + QUERY_INFO(Security) is received, and the first command (READ) consumes most of the response buffer, ksmbd could write beyond the allocated buffer while building a security descriptor. The root cause was that smb2_get_info_sec() checked buffer space using ppntsd_size from xattr, while build_sec_desc() often synthesized a significantly larger descriptor from POSIX ACLs. This patch introduces smb_acl_sec_desc_scratch_len() to accurately compute the final descriptor size beforehand, performs proper buffer checking with smb2_calc_max_out_buf_len(), and uses exact-sized allocation + iov pinning.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31432.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31432.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31432", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06638", "published_at": "2026-04-29T12:55:00Z" }, { "value": "8e-05", "scoring_system": "epss", "scoring_elements": "0.00692", "published_at": "2026-04-24T12:55:00Z" }, { "value": "8e-05", "scoring_system": "epss", "scoring_elements": "0.00694", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31432" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2460537", "reference_id": "2460537", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2460537" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994368?format=api", "purl": "pkg:deb/debian/linux@6.1.162-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.1.162-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/994375?format=api", "purl": "pkg:deb/debian/linux@6.12.74-2~bpo12%2B1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.12.74-2~bpo12%252B1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1067254?format=api", "purl": "pkg:deb/debian/linux@6.19.12-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-dq8r-defv-hbg6" }, { "vulnerability": "VCID-n59e-jkf6-13bf" }, { "vulnerability": "VCID-p3vt-v7gj-gqbc" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.12-1" } ], "aliases": [ "CVE-2026-31432" ], "risk_score": 1.6, "exploitability": "0.5", "weighted_severity": "3.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-brte-gqy3-r3ax" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/351718?format=api", "vulnerability_id": "VCID-c7xf-x7d5-87gn", "summary": "", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31418.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31418.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31418", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.0661", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06618", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09252", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09201", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09294", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09229", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31418" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31418", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31418" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2457831", "reference_id": "2457831", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2457831" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994366?format=api", "purl": "pkg:deb/debian/linux@6.1.4-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.1.4-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/994368?format=api", "purl": "pkg:deb/debian/linux@6.1.162-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.1.162-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/994375?format=api", "purl": "pkg:deb/debian/linux@6.12.74-2~bpo12%2B1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.12.74-2~bpo12%252B1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1067254?format=api", "purl": "pkg:deb/debian/linux@6.19.12-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-dq8r-defv-hbg6" }, { "vulnerability": "VCID-n59e-jkf6-13bf" }, { "vulnerability": "VCID-p3vt-v7gj-gqbc" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.12-1" } ], "aliases": [ "CVE-2026-31418" ], "risk_score": 1.4, "exploitability": "0.5", "weighted_severity": "2.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-c7xf-x7d5-87gn" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78028?format=api", "vulnerability_id": "VCID-dq8r-defv-hbg6", "summary": "kernel: nvme: memory corruption via unprivileged user passthrough", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6238.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6238.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-6238", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.03092", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.02981", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.03063", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.03058", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.03048", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.02996", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.02785", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.02789", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.02809", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.0278", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.02761", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.02757", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.02742", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.02754", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-6238" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2250834", "reference_id": "2250834", "reference_type": "", "scores": [ { "value": "6.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T17:15:22Z/" } ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2250834" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6", "reference_id": "cpe:/o:redhat:enterprise_linux:6", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7", "reference_id": "cpe:/o:redhat:enterprise_linux:7", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8", "reference_id": "cpe:/o:redhat:enterprise_linux:8", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9", "reference_id": "cpe:/o:redhat:enterprise_linux:9", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9" }, { "reference_url": "https://access.redhat.com/security/cve/CVE-2023-6238", "reference_id": "CVE-2023-6238", "reference_type": "", "scores": [ { "value": "6.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T17:15:22Z/" } ], "url": "https://access.redhat.com/security/cve/CVE-2023-6238" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994375?format=api", "purl": "pkg:deb/debian/linux@6.12.74-2~bpo12%2B1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.12.74-2~bpo12%252B1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1068081?format=api", "purl": "pkg:deb/debian/linux@6.19.11-1~bpo13%2B1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.11-1~bpo13%252B1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1026106?format=api", "purl": "pkg:deb/debian/linux@6.19.11-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1g77-qwuy-nkg8" }, { "vulnerability": "VCID-1s77-djzb-xffp" }, { "vulnerability": "VCID-4jvb-unxd-3qg3" }, { "vulnerability": "VCID-5ahq-saw1-suf1" }, { "vulnerability": "VCID-94k1-ja9w-2fd2" }, { "vulnerability": "VCID-brte-gqy3-r3ax" }, { "vulnerability": "VCID-c7xf-x7d5-87gn" }, { "vulnerability": "VCID-dq8r-defv-hbg6" }, { "vulnerability": "VCID-fvvb-p7r7-zkbk" }, { "vulnerability": "VCID-gbkk-anun-a3ce" }, { "vulnerability": "VCID-n59e-jkf6-13bf" }, { "vulnerability": "VCID-p3vt-v7gj-gqbc" }, { "vulnerability": "VCID-p4by-fm53-yybk" }, { "vulnerability": "VCID-pmn9-t8by-myhb" }, { "vulnerability": "VCID-qsdm-cyzs-aufy" }, { "vulnerability": "VCID-texr-5weq-v3dw" }, { "vulnerability": "VCID-v813-y477-vkhn" }, { "vulnerability": "VCID-vzkt-5648-ukh7" }, { "vulnerability": "VCID-yqcj-27j2-tqb8" }, { "vulnerability": "VCID-zh73-s87g-vfff" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.11-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1067254?format=api", "purl": "pkg:deb/debian/linux@6.19.12-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-dq8r-defv-hbg6" }, { "vulnerability": "VCID-n59e-jkf6-13bf" }, { "vulnerability": "VCID-p3vt-v7gj-gqbc" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.12-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1088969?format=api", "purl": "pkg:deb/debian/linux@6.19.13-1~bpo13%2B1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.13-1~bpo13%252B1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1068119?format=api", "purl": "pkg:deb/debian/linux@6.19.13-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-11nd-2f5c-ybe1" }, { "vulnerability": "VCID-1n41-qg8u-r7d5" }, { "vulnerability": "VCID-22zu-qy6y-aub1" }, { "vulnerability": "VCID-25at-2je8-2ufj" }, { "vulnerability": "VCID-2cky-e16g-yqgf" }, { "vulnerability": "VCID-2dp8-mmkf-w7dx" }, { "vulnerability": "VCID-31cj-5nhu-4qa9" }, { "vulnerability": "VCID-3mhu-519z-pbck" }, { "vulnerability": "VCID-3qmn-b1w4-jkg4" }, { "vulnerability": "VCID-3r34-452w-skc2" }, { "vulnerability": "VCID-46pr-2cfb-mbhn" }, { "vulnerability": "VCID-4e1f-qvnx-87fc" }, { "vulnerability": "VCID-4v3t-8s2w-rfbg" }, { "vulnerability": "VCID-5vkh-dbsm-vbgu" }, { "vulnerability": "VCID-656s-tkaz-m7bj" }, { "vulnerability": "VCID-6vtw-v3u5-buce" }, { "vulnerability": "VCID-878n-d9ss-rugc" }, { "vulnerability": "VCID-8v51-tdqe-tbcp" }, { "vulnerability": "VCID-9bru-3rtm-sfey" }, { "vulnerability": "VCID-9rrq-d3g4-jyfy" }, { "vulnerability": "VCID-9wsp-xbm7-yfb9" }, { "vulnerability": "VCID-a454-61sh-j7ay" }, { "vulnerability": "VCID-cc41-mkuk-2fgu" }, { "vulnerability": "VCID-dq8r-defv-hbg6" }, { "vulnerability": "VCID-dqu3-2d1w-bked" }, { "vulnerability": "VCID-dwp4-mc1w-4bcw" }, { "vulnerability": "VCID-emnd-q69n-a3fe" }, { "vulnerability": "VCID-euxu-gjpw-8yhs" }, { "vulnerability": "VCID-f5xb-v8j6-nye2" }, { "vulnerability": "VCID-fhfz-6h5m-hbed" }, { "vulnerability": "VCID-g9zj-fsa9-vkca" }, { "vulnerability": "VCID-gr5a-eqvx-n3ha" }, { "vulnerability": "VCID-hbnp-yx9t-bbfj" }, { "vulnerability": "VCID-hhxy-swz4-eqfy" }, { "vulnerability": "VCID-jset-t9qq-xfah" }, { "vulnerability": "VCID-jyxp-bjx8-kfbd" }, { "vulnerability": "VCID-ka1g-skuq-gqcs" }, { "vulnerability": "VCID-kvq6-38sd-77h7" }, { "vulnerability": "VCID-kw1q-k8cm-j7dj" }, { "vulnerability": "VCID-n59e-jkf6-13bf" }, { "vulnerability": "VCID-n99v-8wyx-a3cr" }, { "vulnerability": "VCID-nw2n-9b59-gbdm" }, { "vulnerability": "VCID-p1xn-hbgr-efby" }, { "vulnerability": "VCID-p3vt-v7gj-gqbc" }, { "vulnerability": "VCID-pest-xjma-sfbn" }, { "vulnerability": "VCID-pgrh-f1dv-27dh" }, { "vulnerability": "VCID-pj46-9jp7-33ha" }, { "vulnerability": "VCID-r4kz-m7m8-c3b2" }, { "vulnerability": "VCID-ruxz-24k9-sbcf" }, { "vulnerability": "VCID-sqkd-cwbk-tkec" }, { "vulnerability": "VCID-szq9-t587-83h2" }, { "vulnerability": "VCID-tafy-p8yj-ukdv" }, { "vulnerability": "VCID-than-1kz8-yucx" }, { "vulnerability": "VCID-tz5h-hd3e-rbbv" }, { "vulnerability": "VCID-uvrh-s5dy-puc5" }, { "vulnerability": "VCID-uyug-vjrw-87h6" }, { "vulnerability": "VCID-uzrt-axb3-qfcs" }, { "vulnerability": "VCID-vx8c-nssy-ubaj" }, { "vulnerability": "VCID-vzyy-16xe-qkgm" }, { "vulnerability": "VCID-w8d1-9zry-wydv" }, { "vulnerability": "VCID-wvu1-rfc1-zya9" }, { "vulnerability": "VCID-x9wt-jmne-vudk" }, { "vulnerability": "VCID-y54q-e569-p7cx" }, { "vulnerability": "VCID-yahm-29wh-z3e9" }, { "vulnerability": "VCID-yj9c-fda5-57g2" }, { "vulnerability": "VCID-zgb6-kq8s-w3dm" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.13-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1077786?format=api", "purl": "pkg:deb/debian/linux@6.19.14-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-dq8r-defv-hbg6" }, { "vulnerability": "VCID-n59e-jkf6-13bf" }, { "vulnerability": "VCID-p3vt-v7gj-gqbc" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.14-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1067255?format=api", "purl": "pkg:deb/debian/linux@7.0-1~exp1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@7.0-1~exp1" } ], "aliases": [ "CVE-2023-6238" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "6.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dq8r-defv-hbg6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/351722?format=api", "vulnerability_id": "VCID-fvvb-p7r7-zkbk", "summary": "", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31422.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31422.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31422", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06618", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.0661", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09229", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09201", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09252", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09294", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31422" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31422", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31422" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2457834", "reference_id": "2457834", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2457834" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994366?format=api", "purl": "pkg:deb/debian/linux@6.1.4-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.1.4-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/994368?format=api", "purl": "pkg:deb/debian/linux@6.1.162-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.1.162-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/994375?format=api", "purl": "pkg:deb/debian/linux@6.12.74-2~bpo12%2B1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.12.74-2~bpo12%252B1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1067254?format=api", "purl": "pkg:deb/debian/linux@6.19.12-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-dq8r-defv-hbg6" }, { "vulnerability": "VCID-n59e-jkf6-13bf" }, { "vulnerability": "VCID-p3vt-v7gj-gqbc" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.12-1" } ], "aliases": [ "CVE-2026-31422" ], "risk_score": 2.1, "exploitability": "0.5", "weighted_severity": "4.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-fvvb-p7r7-zkbk" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/352864?format=api", "vulnerability_id": "VCID-gbkk-anun-a3ce", "summary": "", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-54505", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0001", "scoring_system": "epss", "scoring_elements": "0.01152", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-54505" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-54505", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-54505" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" }, { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://www.amd.com/en/resources/product-security/bulletin/AMD-SB-7053.html", "reference_id": "AMD-SB-7053.html", "reference_type": "", "scores": [ { "value": "2", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-27T16:04:59Z/" } ], "url": "https://www.amd.com/en/resources/product-security/bulletin/AMD-SB-7053.html" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-488.html", "reference_id": "XSA-488", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-488.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994366?format=api", "purl": "pkg:deb/debian/linux@6.1.4-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.1.4-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/994368?format=api", "purl": "pkg:deb/debian/linux@6.1.162-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.1.162-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/994375?format=api", "purl": "pkg:deb/debian/linux@6.12.74-2~bpo12%2B1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.12.74-2~bpo12%252B1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1067254?format=api", "purl": "pkg:deb/debian/linux@6.19.12-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-dq8r-defv-hbg6" }, { "vulnerability": "VCID-n59e-jkf6-13bf" }, { "vulnerability": "VCID-p3vt-v7gj-gqbc" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.12-1" } ], "aliases": [ "CVE-2025-54505", "XSA-488" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gbkk-anun-a3ce" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79006?format=api", "vulnerability_id": "VCID-n59e-jkf6-13bf", "summary": "kernel: ntfs3 local privledge escalation if NTFS character set and remount and umount called simultaneously", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3238.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3238.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-3238", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0008", "scoring_system": "epss", "scoring_elements": "0.23708", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0008", "scoring_system": "epss", "scoring_elements": "0.23336", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0008", "scoring_system": "epss", "scoring_elements": "0.23547", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0008", "scoring_system": "epss", "scoring_elements": "0.23364", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0008", "scoring_system": "epss", "scoring_elements": "0.23353", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0008", "scoring_system": "epss", "scoring_elements": "0.23751", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0008", "scoring_system": "epss", "scoring_elements": "0.23531", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0008", "scoring_system": "epss", "scoring_elements": "0.23602", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0008", "scoring_system": "epss", "scoring_elements": "0.23648", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0008", "scoring_system": "epss", "scoring_elements": "0.23664", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0008", "scoring_system": "epss", "scoring_elements": "0.23622", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0008", "scoring_system": "epss", "scoring_elements": "0.23565", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0008", "scoring_system": "epss", "scoring_elements": "0.23577", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0008", "scoring_system": "epss", "scoring_elements": "0.23567", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-3238" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2127927", "reference_id": "2127927", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-01T13:32:12Z/" } ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2127927" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994368?format=api", "purl": "pkg:deb/debian/linux@6.1.162-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.1.162-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/994375?format=api", "purl": "pkg:deb/debian/linux@6.12.74-2~bpo12%2B1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.12.74-2~bpo12%252B1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1068081?format=api", "purl": "pkg:deb/debian/linux@6.19.11-1~bpo13%2B1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.11-1~bpo13%252B1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1026106?format=api", "purl": "pkg:deb/debian/linux@6.19.11-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1g77-qwuy-nkg8" }, { "vulnerability": "VCID-1s77-djzb-xffp" }, { "vulnerability": "VCID-4jvb-unxd-3qg3" }, { "vulnerability": "VCID-5ahq-saw1-suf1" }, { "vulnerability": "VCID-94k1-ja9w-2fd2" }, { "vulnerability": "VCID-brte-gqy3-r3ax" }, { "vulnerability": "VCID-c7xf-x7d5-87gn" }, { "vulnerability": "VCID-dq8r-defv-hbg6" }, { "vulnerability": "VCID-fvvb-p7r7-zkbk" }, { "vulnerability": "VCID-gbkk-anun-a3ce" }, { "vulnerability": "VCID-n59e-jkf6-13bf" }, { "vulnerability": "VCID-p3vt-v7gj-gqbc" }, { "vulnerability": "VCID-p4by-fm53-yybk" }, { "vulnerability": "VCID-pmn9-t8by-myhb" }, { "vulnerability": "VCID-qsdm-cyzs-aufy" }, { "vulnerability": "VCID-texr-5weq-v3dw" }, { "vulnerability": "VCID-v813-y477-vkhn" }, { "vulnerability": "VCID-vzkt-5648-ukh7" }, { "vulnerability": "VCID-yqcj-27j2-tqb8" }, { "vulnerability": "VCID-zh73-s87g-vfff" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.11-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1067254?format=api", "purl": "pkg:deb/debian/linux@6.19.12-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-dq8r-defv-hbg6" }, { "vulnerability": "VCID-n59e-jkf6-13bf" }, { "vulnerability": "VCID-p3vt-v7gj-gqbc" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.12-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1088969?format=api", "purl": "pkg:deb/debian/linux@6.19.13-1~bpo13%2B1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.13-1~bpo13%252B1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1068119?format=api", "purl": "pkg:deb/debian/linux@6.19.13-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-11nd-2f5c-ybe1" }, { "vulnerability": "VCID-1n41-qg8u-r7d5" }, { "vulnerability": "VCID-22zu-qy6y-aub1" }, { "vulnerability": "VCID-25at-2je8-2ufj" }, { "vulnerability": "VCID-2cky-e16g-yqgf" }, { "vulnerability": "VCID-2dp8-mmkf-w7dx" }, { "vulnerability": "VCID-31cj-5nhu-4qa9" }, { "vulnerability": "VCID-3mhu-519z-pbck" }, { "vulnerability": "VCID-3qmn-b1w4-jkg4" }, { "vulnerability": "VCID-3r34-452w-skc2" }, { "vulnerability": "VCID-46pr-2cfb-mbhn" }, { "vulnerability": "VCID-4e1f-qvnx-87fc" }, { "vulnerability": "VCID-4v3t-8s2w-rfbg" }, { "vulnerability": "VCID-5vkh-dbsm-vbgu" }, { "vulnerability": "VCID-656s-tkaz-m7bj" }, { "vulnerability": "VCID-6vtw-v3u5-buce" }, { "vulnerability": "VCID-878n-d9ss-rugc" }, { "vulnerability": "VCID-8v51-tdqe-tbcp" }, { "vulnerability": "VCID-9bru-3rtm-sfey" }, { "vulnerability": "VCID-9rrq-d3g4-jyfy" }, { "vulnerability": "VCID-9wsp-xbm7-yfb9" }, { "vulnerability": "VCID-a454-61sh-j7ay" }, { "vulnerability": "VCID-cc41-mkuk-2fgu" }, { "vulnerability": "VCID-dq8r-defv-hbg6" }, { "vulnerability": "VCID-dqu3-2d1w-bked" }, { "vulnerability": "VCID-dwp4-mc1w-4bcw" }, { "vulnerability": "VCID-emnd-q69n-a3fe" }, { "vulnerability": "VCID-euxu-gjpw-8yhs" }, { "vulnerability": "VCID-f5xb-v8j6-nye2" }, { "vulnerability": "VCID-fhfz-6h5m-hbed" }, { "vulnerability": "VCID-g9zj-fsa9-vkca" }, { "vulnerability": "VCID-gr5a-eqvx-n3ha" }, { "vulnerability": "VCID-hbnp-yx9t-bbfj" }, { "vulnerability": "VCID-hhxy-swz4-eqfy" }, { "vulnerability": "VCID-jset-t9qq-xfah" }, { "vulnerability": "VCID-jyxp-bjx8-kfbd" }, { "vulnerability": "VCID-ka1g-skuq-gqcs" }, { "vulnerability": "VCID-kvq6-38sd-77h7" }, { "vulnerability": "VCID-kw1q-k8cm-j7dj" }, { "vulnerability": "VCID-n59e-jkf6-13bf" }, { "vulnerability": "VCID-n99v-8wyx-a3cr" }, { "vulnerability": "VCID-nw2n-9b59-gbdm" }, { "vulnerability": "VCID-p1xn-hbgr-efby" }, { "vulnerability": "VCID-p3vt-v7gj-gqbc" }, { "vulnerability": "VCID-pest-xjma-sfbn" }, { "vulnerability": "VCID-pgrh-f1dv-27dh" }, { "vulnerability": "VCID-pj46-9jp7-33ha" }, { "vulnerability": "VCID-r4kz-m7m8-c3b2" }, { "vulnerability": "VCID-ruxz-24k9-sbcf" }, { "vulnerability": "VCID-sqkd-cwbk-tkec" }, { "vulnerability": "VCID-szq9-t587-83h2" }, { "vulnerability": "VCID-tafy-p8yj-ukdv" }, { "vulnerability": "VCID-than-1kz8-yucx" }, { "vulnerability": "VCID-tz5h-hd3e-rbbv" }, { "vulnerability": "VCID-uvrh-s5dy-puc5" }, { "vulnerability": "VCID-uyug-vjrw-87h6" }, { "vulnerability": "VCID-uzrt-axb3-qfcs" }, { "vulnerability": "VCID-vx8c-nssy-ubaj" }, { "vulnerability": "VCID-vzyy-16xe-qkgm" }, { "vulnerability": "VCID-w8d1-9zry-wydv" }, { "vulnerability": "VCID-wvu1-rfc1-zya9" }, { "vulnerability": "VCID-x9wt-jmne-vudk" }, { "vulnerability": "VCID-y54q-e569-p7cx" }, { "vulnerability": "VCID-yahm-29wh-z3e9" }, { "vulnerability": "VCID-yj9c-fda5-57g2" }, { "vulnerability": "VCID-zgb6-kq8s-w3dm" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.13-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1077786?format=api", "purl": "pkg:deb/debian/linux@6.19.14-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-dq8r-defv-hbg6" }, { "vulnerability": "VCID-n59e-jkf6-13bf" }, { "vulnerability": "VCID-p3vt-v7gj-gqbc" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.14-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1067255?format=api", "purl": "pkg:deb/debian/linux@7.0-1~exp1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@7.0-1~exp1" } ], "aliases": [ "CVE-2022-3238" ], "risk_score": 3.5, "exploitability": "0.5", "weighted_severity": "7.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-n59e-jkf6-13bf" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/72268?format=api", "vulnerability_id": "VCID-p3vt-v7gj-gqbc", "summary": "kernel: io_uring: check if iowq is killed before queuing", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-56709.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-56709.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-56709", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09407", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09275", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09424", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09479", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09446", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.10993", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.10994", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.10962", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.10803", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.10939", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.10977", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.11039", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.10863", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-56709" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56709", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56709" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2334795", "reference_id": "2334795", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2334795" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:20518", "reference_id": "RHSA-2025:20518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:20518" }, { "reference_url": "https://usn.ubuntu.com/7379-1/", "reference_id": "USN-7379-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7379-1/" }, { "reference_url": "https://usn.ubuntu.com/7379-2/", "reference_id": "USN-7379-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7379-2/" }, { "reference_url": "https://usn.ubuntu.com/7380-1/", "reference_id": "USN-7380-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7380-1/" }, { "reference_url": "https://usn.ubuntu.com/7381-1/", "reference_id": "USN-7381-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7381-1/" }, { "reference_url": "https://usn.ubuntu.com/7382-1/", "reference_id": "USN-7382-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7382-1/" }, { "reference_url": "https://usn.ubuntu.com/7513-1/", "reference_id": "USN-7513-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7513-1/" }, { "reference_url": "https://usn.ubuntu.com/7513-2/", "reference_id": "USN-7513-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7513-2/" }, { "reference_url": "https://usn.ubuntu.com/7513-3/", "reference_id": "USN-7513-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7513-3/" }, { "reference_url": "https://usn.ubuntu.com/7513-4/", "reference_id": "USN-7513-4", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7513-4/" }, { "reference_url": "https://usn.ubuntu.com/7513-5/", "reference_id": "USN-7513-5", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7513-5/" }, { "reference_url": "https://usn.ubuntu.com/7514-1/", "reference_id": "USN-7514-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7514-1/" }, { "reference_url": "https://usn.ubuntu.com/7515-1/", "reference_id": "USN-7515-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7515-1/" }, { "reference_url": "https://usn.ubuntu.com/7515-2/", "reference_id": "USN-7515-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7515-2/" }, { "reference_url": "https://usn.ubuntu.com/7522-1/", "reference_id": "USN-7522-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7522-1/" }, { "reference_url": "https://usn.ubuntu.com/7523-1/", "reference_id": "USN-7523-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7523-1/" }, { "reference_url": "https://usn.ubuntu.com/7524-1/", "reference_id": "USN-7524-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7524-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994375?format=api", "purl": "pkg:deb/debian/linux@6.12.74-2~bpo12%2B1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.12.74-2~bpo12%252B1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1068081?format=api", "purl": "pkg:deb/debian/linux@6.19.11-1~bpo13%2B1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.11-1~bpo13%252B1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1026106?format=api", "purl": "pkg:deb/debian/linux@6.19.11-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1g77-qwuy-nkg8" }, { "vulnerability": "VCID-1s77-djzb-xffp" }, { "vulnerability": "VCID-4jvb-unxd-3qg3" }, { "vulnerability": "VCID-5ahq-saw1-suf1" }, { "vulnerability": "VCID-94k1-ja9w-2fd2" }, { "vulnerability": "VCID-brte-gqy3-r3ax" }, { "vulnerability": "VCID-c7xf-x7d5-87gn" }, { "vulnerability": "VCID-dq8r-defv-hbg6" }, { "vulnerability": "VCID-fvvb-p7r7-zkbk" }, { "vulnerability": "VCID-gbkk-anun-a3ce" }, { "vulnerability": "VCID-n59e-jkf6-13bf" }, { "vulnerability": "VCID-p3vt-v7gj-gqbc" }, { "vulnerability": "VCID-p4by-fm53-yybk" }, { "vulnerability": "VCID-pmn9-t8by-myhb" }, { "vulnerability": "VCID-qsdm-cyzs-aufy" }, { "vulnerability": "VCID-texr-5weq-v3dw" }, { "vulnerability": "VCID-v813-y477-vkhn" }, { "vulnerability": "VCID-vzkt-5648-ukh7" }, { "vulnerability": "VCID-yqcj-27j2-tqb8" }, { "vulnerability": "VCID-zh73-s87g-vfff" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.11-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1067254?format=api", "purl": "pkg:deb/debian/linux@6.19.12-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-dq8r-defv-hbg6" }, { "vulnerability": "VCID-n59e-jkf6-13bf" }, { "vulnerability": "VCID-p3vt-v7gj-gqbc" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.12-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1088969?format=api", "purl": "pkg:deb/debian/linux@6.19.13-1~bpo13%2B1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.13-1~bpo13%252B1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1068119?format=api", "purl": "pkg:deb/debian/linux@6.19.13-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-11nd-2f5c-ybe1" }, { "vulnerability": "VCID-1n41-qg8u-r7d5" }, { "vulnerability": "VCID-22zu-qy6y-aub1" }, { "vulnerability": "VCID-25at-2je8-2ufj" }, { "vulnerability": "VCID-2cky-e16g-yqgf" }, { "vulnerability": "VCID-2dp8-mmkf-w7dx" }, { "vulnerability": "VCID-31cj-5nhu-4qa9" }, { "vulnerability": "VCID-3mhu-519z-pbck" }, { "vulnerability": "VCID-3qmn-b1w4-jkg4" }, { "vulnerability": "VCID-3r34-452w-skc2" }, { "vulnerability": "VCID-46pr-2cfb-mbhn" }, { "vulnerability": "VCID-4e1f-qvnx-87fc" }, { "vulnerability": "VCID-4v3t-8s2w-rfbg" }, { "vulnerability": "VCID-5vkh-dbsm-vbgu" }, { "vulnerability": "VCID-656s-tkaz-m7bj" }, { "vulnerability": "VCID-6vtw-v3u5-buce" }, { "vulnerability": "VCID-878n-d9ss-rugc" }, { "vulnerability": "VCID-8v51-tdqe-tbcp" }, { "vulnerability": "VCID-9bru-3rtm-sfey" }, { "vulnerability": "VCID-9rrq-d3g4-jyfy" }, { "vulnerability": "VCID-9wsp-xbm7-yfb9" }, { "vulnerability": "VCID-a454-61sh-j7ay" }, { "vulnerability": "VCID-cc41-mkuk-2fgu" }, { "vulnerability": "VCID-dq8r-defv-hbg6" }, { "vulnerability": "VCID-dqu3-2d1w-bked" }, { "vulnerability": "VCID-dwp4-mc1w-4bcw" }, { "vulnerability": "VCID-emnd-q69n-a3fe" }, { "vulnerability": "VCID-euxu-gjpw-8yhs" }, { "vulnerability": "VCID-f5xb-v8j6-nye2" }, { "vulnerability": "VCID-fhfz-6h5m-hbed" }, { "vulnerability": "VCID-g9zj-fsa9-vkca" }, { "vulnerability": "VCID-gr5a-eqvx-n3ha" }, { "vulnerability": "VCID-hbnp-yx9t-bbfj" }, { "vulnerability": "VCID-hhxy-swz4-eqfy" }, { "vulnerability": "VCID-jset-t9qq-xfah" }, { "vulnerability": "VCID-jyxp-bjx8-kfbd" }, { "vulnerability": "VCID-ka1g-skuq-gqcs" }, { "vulnerability": "VCID-kvq6-38sd-77h7" }, { "vulnerability": "VCID-kw1q-k8cm-j7dj" }, { "vulnerability": "VCID-n59e-jkf6-13bf" }, { "vulnerability": "VCID-n99v-8wyx-a3cr" }, { "vulnerability": "VCID-nw2n-9b59-gbdm" }, { "vulnerability": "VCID-p1xn-hbgr-efby" }, { "vulnerability": "VCID-p3vt-v7gj-gqbc" }, { "vulnerability": "VCID-pest-xjma-sfbn" }, { "vulnerability": "VCID-pgrh-f1dv-27dh" }, { "vulnerability": "VCID-pj46-9jp7-33ha" }, { "vulnerability": "VCID-r4kz-m7m8-c3b2" }, { "vulnerability": "VCID-ruxz-24k9-sbcf" }, { "vulnerability": "VCID-sqkd-cwbk-tkec" }, { "vulnerability": "VCID-szq9-t587-83h2" }, { "vulnerability": "VCID-tafy-p8yj-ukdv" }, { "vulnerability": "VCID-than-1kz8-yucx" }, { "vulnerability": "VCID-tz5h-hd3e-rbbv" }, { "vulnerability": "VCID-uvrh-s5dy-puc5" }, { "vulnerability": "VCID-uyug-vjrw-87h6" }, { "vulnerability": "VCID-uzrt-axb3-qfcs" }, { "vulnerability": "VCID-vx8c-nssy-ubaj" }, { "vulnerability": "VCID-vzyy-16xe-qkgm" }, { "vulnerability": "VCID-w8d1-9zry-wydv" }, { "vulnerability": "VCID-wvu1-rfc1-zya9" }, { "vulnerability": "VCID-x9wt-jmne-vudk" }, { "vulnerability": "VCID-y54q-e569-p7cx" }, { "vulnerability": "VCID-yahm-29wh-z3e9" }, { "vulnerability": "VCID-yj9c-fda5-57g2" }, { "vulnerability": "VCID-zgb6-kq8s-w3dm" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.13-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1077786?format=api", "purl": "pkg:deb/debian/linux@6.19.14-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-dq8r-defv-hbg6" }, { "vulnerability": "VCID-n59e-jkf6-13bf" }, { "vulnerability": "VCID-p3vt-v7gj-gqbc" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.14-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1067255?format=api", "purl": "pkg:deb/debian/linux@7.0-1~exp1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@7.0-1~exp1" } ], "aliases": [ "CVE-2024-56709" ], "risk_score": 2.0, "exploitability": "0.5", "weighted_severity": "4.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-p3vt-v7gj-gqbc" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/351725?format=api", "vulnerability_id": "VCID-p4by-fm53-yybk", "summary": "", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31425.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31425.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31425", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06618", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.0661", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09229", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09201", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09252", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09294", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31425" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31425", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31425" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2457836", "reference_id": "2457836", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2457836" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994366?format=api", "purl": "pkg:deb/debian/linux@6.1.4-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.1.4-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/994368?format=api", "purl": "pkg:deb/debian/linux@6.1.162-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.1.162-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/994375?format=api", "purl": "pkg:deb/debian/linux@6.12.74-2~bpo12%2B1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.12.74-2~bpo12%252B1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1067254?format=api", "purl": "pkg:deb/debian/linux@6.19.12-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-dq8r-defv-hbg6" }, { "vulnerability": "VCID-n59e-jkf6-13bf" }, { "vulnerability": "VCID-p3vt-v7gj-gqbc" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.12-1" } ], "aliases": [ "CVE-2026-31425" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-p4by-fm53-yybk" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/353937?format=api", "vulnerability_id": "VCID-pmn9-t8by-myhb", "summary": "In the Linux kernel, the following vulnerability has been resolved: crypto: algif_aead - Revert to operating out-of-place This mostly reverts commit 72548b093ee3 except for the copying of the associated data. There is no benefit in operating in-place in algif_aead since the source and destination come from different mappings. Get rid of all the complexity added for in-place operation and just copy the AD directly.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31431.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31431.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31431", "reference_id": "", "reference_type": "", "scores": [ { "value": "7e-05", "scoring_system": "epss", "scoring_elements": "0.00597", "published_at": "2026-04-24T12:55:00Z" }, { "value": "7e-05", "scoring_system": "epss", "scoring_elements": "0.00599", "published_at": "2026-04-26T12:55:00Z" }, { "value": "8e-05", "scoring_system": "epss", "scoring_elements": "0.00718", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31431" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31431", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31431" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" }, { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://git.kernel.org/stable/c/19d43105a97be0810edbda875f2cd03f30dc130c", "reference_id": "19d43105a97be0810edbda875f2cd03f30dc130c", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2026-04-29T19:42:30Z/" } ], "url": "https://git.kernel.org/stable/c/19d43105a97be0810edbda875f2cd03f30dc130c" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2460538", "reference_id": "2460538", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2460538" }, { "reference_url": "https://git.kernel.org/stable/c/3115af9644c342b356f3f07a4dd1c8905cd9a6fc", "reference_id": "3115af9644c342b356f3f07a4dd1c8905cd9a6fc", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2026-04-29T19:42:30Z/" } ], "url": "https://git.kernel.org/stable/c/3115af9644c342b356f3f07a4dd1c8905cd9a6fc" }, { "reference_url": "https://git.kernel.org/stable/c/893d22e0135fa394db81df88697fba6032747667", "reference_id": "893d22e0135fa394db81df88697fba6032747667", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2026-04-29T19:42:30Z/" } ], "url": "https://git.kernel.org/stable/c/893d22e0135fa394db81df88697fba6032747667" }, { "reference_url": "https://git.kernel.org/stable/c/8b88d99341f139e23bdeb1027a2a3ae10d341d82", "reference_id": "8b88d99341f139e23bdeb1027a2a3ae10d341d82", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2026-04-29T19:42:30Z/" } ], "url": "https://git.kernel.org/stable/c/8b88d99341f139e23bdeb1027a2a3ae10d341d82" }, { "reference_url": "https://git.kernel.org/stable/c/961cfa271a918ad4ae452420e7c303149002875b", "reference_id": "961cfa271a918ad4ae452420e7c303149002875b", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2026-04-29T19:42:30Z/" } ], "url": "https://git.kernel.org/stable/c/961cfa271a918ad4ae452420e7c303149002875b" }, { "reference_url": "https://git.kernel.org/stable/c/a664bf3d603dc3bdcf9ae47cc21e0daec706d7a5", "reference_id": "a664bf3d603dc3bdcf9ae47cc21e0daec706d7a5", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2026-04-29T19:42:30Z/" } ], "url": "https://git.kernel.org/stable/c/a664bf3d603dc3bdcf9ae47cc21e0daec706d7a5" }, { "reference_url": "https://security.archlinux.org/AVG-2908", "reference_id": "AVG-2908", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2908" }, { "reference_url": "https://git.kernel.org/stable/c/ce42ee423e58dffa5ec03524054c9d8bfd4f6237", "reference_id": "ce42ee423e58dffa5ec03524054c9d8bfd4f6237", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2026-04-29T19:42:30Z/" } ], "url": "https://git.kernel.org/stable/c/ce42ee423e58dffa5ec03524054c9d8bfd4f6237" }, { "reference_url": "https://git.kernel.org/stable/c/fafe0fa2995a0f7073c1c358d7d3145bcc9aedd8", "reference_id": "fafe0fa2995a0f7073c1c358d7d3145bcc9aedd8", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2026-04-29T19:42:30Z/" } ], "url": "https://git.kernel.org/stable/c/fafe0fa2995a0f7073c1c358d7d3145bcc9aedd8" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994366?format=api", "purl": "pkg:deb/debian/linux@6.1.4-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.1.4-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/994368?format=api", "purl": "pkg:deb/debian/linux@6.1.162-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.1.162-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/994375?format=api", "purl": "pkg:deb/debian/linux@6.12.74-2~bpo12%2B1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.12.74-2~bpo12%252B1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1067254?format=api", "purl": "pkg:deb/debian/linux@6.19.12-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-dq8r-defv-hbg6" }, { "vulnerability": "VCID-n59e-jkf6-13bf" }, { "vulnerability": "VCID-p3vt-v7gj-gqbc" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.12-1" } ], "aliases": [ "CVE-2026-31431" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pmn9-t8by-myhb" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/351714?format=api", "vulnerability_id": "VCID-qsdm-cyzs-aufy", "summary": "", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31414.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31414.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31414", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06618", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.0661", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09229", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09252", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09294", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00072", "scoring_system": "epss", "scoring_elements": "0.21674", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31414" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31414", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31414" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2457830", "reference_id": "2457830", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2457830" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994366?format=api", "purl": "pkg:deb/debian/linux@6.1.4-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.1.4-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/994368?format=api", "purl": "pkg:deb/debian/linux@6.1.162-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.1.162-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/994375?format=api", "purl": "pkg:deb/debian/linux@6.12.74-2~bpo12%2B1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.12.74-2~bpo12%252B1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1067254?format=api", "purl": "pkg:deb/debian/linux@6.19.12-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-dq8r-defv-hbg6" }, { "vulnerability": "VCID-n59e-jkf6-13bf" }, { "vulnerability": "VCID-p3vt-v7gj-gqbc" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.12-1" } ], "aliases": [ "CVE-2026-31414" ], "risk_score": 2.6, "exploitability": "0.5", "weighted_severity": "5.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qsdm-cyzs-aufy" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/351724?format=api", "vulnerability_id": "VCID-texr-5weq-v3dw", "summary": "", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31424.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31424.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31424", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06618", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.0661", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09229", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09201", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09252", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09294", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31424" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31424", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31424" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2457826", "reference_id": "2457826", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2457826" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994366?format=api", "purl": "pkg:deb/debian/linux@6.1.4-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.1.4-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/994368?format=api", "purl": "pkg:deb/debian/linux@6.1.162-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.1.162-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/994375?format=api", "purl": "pkg:deb/debian/linux@6.12.74-2~bpo12%2B1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.12.74-2~bpo12%252B1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1067254?format=api", "purl": "pkg:deb/debian/linux@6.19.12-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-dq8r-defv-hbg6" }, { "vulnerability": "VCID-n59e-jkf6-13bf" }, { "vulnerability": "VCID-p3vt-v7gj-gqbc" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.12-1" } ], "aliases": [ "CVE-2026-31424" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-texr-5weq-v3dw" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/353168?format=api", "vulnerability_id": "VCID-v813-y477-vkhn", "summary": "", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31429.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.6", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31429.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31429", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.04548", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.04584", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.06418", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.0652", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31429" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2459692", "reference_id": "2459692", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2459692" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994375?format=api", "purl": "pkg:deb/debian/linux@6.12.74-2~bpo12%2B1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.12.74-2~bpo12%252B1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1067254?format=api", "purl": "pkg:deb/debian/linux@6.19.12-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-dq8r-defv-hbg6" }, { "vulnerability": "VCID-n59e-jkf6-13bf" }, { "vulnerability": "VCID-p3vt-v7gj-gqbc" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.12-1" } ], "aliases": [ "CVE-2026-31429" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-v813-y477-vkhn" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/351715?format=api", "vulnerability_id": "VCID-vzkt-5648-ukh7", "summary": "", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31415.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31415.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31415", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08491", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08477", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11941", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11841", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11993", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11971", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31415" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31415", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31415" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2457840", "reference_id": "2457840", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2457840" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994366?format=api", "purl": "pkg:deb/debian/linux@6.1.4-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.1.4-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/994368?format=api", "purl": "pkg:deb/debian/linux@6.1.162-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.1.162-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/994375?format=api", "purl": "pkg:deb/debian/linux@6.12.74-2~bpo12%2B1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.12.74-2~bpo12%252B1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1067254?format=api", "purl": "pkg:deb/debian/linux@6.19.12-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-dq8r-defv-hbg6" }, { "vulnerability": "VCID-n59e-jkf6-13bf" }, { "vulnerability": "VCID-p3vt-v7gj-gqbc" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.12-1" } ], "aliases": [ "CVE-2026-31415" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vzkt-5648-ukh7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/351719?format=api", "vulnerability_id": "VCID-yqcj-27j2-tqb8", "summary": "", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31419.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31419.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31419", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00013", "scoring_system": "epss", "scoring_elements": "0.02217", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.03916", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.03904", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00022", "scoring_system": "epss", "scoring_elements": "0.06029", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00022", "scoring_system": "epss", "scoring_elements": "0.06055", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00022", "scoring_system": "epss", "scoring_elements": "0.06085", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31419" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31419", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31419" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" }, { "value": "7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2457829", "reference_id": "2457829", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2457829" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994366?format=api", "purl": "pkg:deb/debian/linux@6.1.4-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.1.4-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/994368?format=api", "purl": "pkg:deb/debian/linux@6.1.162-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.1.162-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/994375?format=api", "purl": "pkg:deb/debian/linux@6.12.74-2~bpo12%2B1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.12.74-2~bpo12%252B1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1067254?format=api", "purl": "pkg:deb/debian/linux@6.19.12-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-dq8r-defv-hbg6" }, { "vulnerability": "VCID-n59e-jkf6-13bf" }, { "vulnerability": "VCID-p3vt-v7gj-gqbc" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.12-1" } ], "aliases": [ "CVE-2026-31419" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-yqcj-27j2-tqb8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/353169?format=api", "vulnerability_id": "VCID-zh73-s87g-vfff", "summary": "", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31430.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.6", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31430.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31430", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00012", "scoring_system": "epss", "scoring_elements": "0.01696", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00012", "scoring_system": "epss", "scoring_elements": "0.0171", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.0344", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.03486", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31430" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2459691", "reference_id": "2459691", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2459691" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994375?format=api", "purl": "pkg:deb/debian/linux@6.12.74-2~bpo12%2B1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.12.74-2~bpo12%252B1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1067254?format=api", "purl": "pkg:deb/debian/linux@6.19.12-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-dq8r-defv-hbg6" }, { "vulnerability": "VCID-n59e-jkf6-13bf" }, { "vulnerability": "VCID-p3vt-v7gj-gqbc" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.12-1" } ], "aliases": [ "CVE-2026-31430" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zh73-s87g-vfff" } ], "risk_score": "3.5", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.12-1" }