Lookup for vulnerable packages by Package URL.

GET /api/packages/1077786?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/1077786?format=api",
    "purl": "pkg:deb/debian/linux@6.19.14-1",
    "type": "deb",
    "namespace": "debian",
    "name": "linux",
    "version": "6.19.14-1",
    "qualifiers": {},
    "subpath": "",
    "is_vulnerable": true,
    "next_non_vulnerable_version": "7.1~rc2-1~exp1",
    "latest_non_vulnerable_version": "7.1~rc2-1~exp1",
    "affected_by_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/355675?format=api",
            "vulnerability_id": "VCID-1apd-wwuv-cbem",
            "summary": "kernel: smb: client: validate the whole DACL before rewriting it in cifsacl",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31709.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31709.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31709",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00039",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11538",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.0004",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12077",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.0004",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12133",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31709"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2464476",
                    "reference_id": "2464476",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2464476"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1089393?format=api",
                    "purl": "pkg:deb/debian/linux@7.0.3-1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-dq8r-defv-hbg6"
                        },
                        {
                            "vulnerability": "VCID-n59e-jkf6-13bf"
                        },
                        {
                            "vulnerability": "VCID-p3vt-v7gj-gqbc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@7.0.3-1"
                }
            ],
            "aliases": [
                "CVE-2026-31709"
            ],
            "risk_score": 3.2,
            "exploitability": "0.5",
            "weighted_severity": "6.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1apd-wwuv-cbem"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/355630?format=api",
            "vulnerability_id": "VCID-23s6-fs1s-4kfb",
            "summary": "kernel: ksmbd: validate response sizes in ipc_validate_msg()",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31707.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31707.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31707",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01737",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02363",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02403",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31707"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2464366",
                    "reference_id": "2464366",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2464366"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1089393?format=api",
                    "purl": "pkg:deb/debian/linux@7.0.3-1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-dq8r-defv-hbg6"
                        },
                        {
                            "vulnerability": "VCID-n59e-jkf6-13bf"
                        },
                        {
                            "vulnerability": "VCID-p3vt-v7gj-gqbc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@7.0.3-1"
                }
            ],
            "aliases": [
                "CVE-2026-31707"
            ],
            "risk_score": 1.8,
            "exploitability": "0.5",
            "weighted_severity": "3.5",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-23s6-fs1s-4kfb"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/355674?format=api",
            "vulnerability_id": "VCID-359m-ajks-23ef",
            "summary": "kernel: smb: server: fix active_num_conn leak on transport allocation failure",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31711.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31711.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31711",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00194",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40986",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.0028",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51294",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.0028",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51337",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31711"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2464475",
                    "reference_id": "2464475",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2464475"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1089393?format=api",
                    "purl": "pkg:deb/debian/linux@7.0.3-1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-dq8r-defv-hbg6"
                        },
                        {
                            "vulnerability": "VCID-n59e-jkf6-13bf"
                        },
                        {
                            "vulnerability": "VCID-p3vt-v7gj-gqbc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@7.0.3-1"
                }
            ],
            "aliases": [
                "CVE-2026-31711"
            ],
            "risk_score": 1.9,
            "exploitability": "0.5",
            "weighted_severity": "3.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-359m-ajks-23ef"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/354909?format=api",
            "vulnerability_id": "VCID-3apf-j1g4-vfbr",
            "summary": "",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31688.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31688.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31688",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02901",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02938",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04983",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06709",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31688"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31688",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31688"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2463259",
                    "reference_id": "2463259",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2463259"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1089393?format=api",
                    "purl": "pkg:deb/debian/linux@7.0.3-1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-dq8r-defv-hbg6"
                        },
                        {
                            "vulnerability": "VCID-n59e-jkf6-13bf"
                        },
                        {
                            "vulnerability": "VCID-p3vt-v7gj-gqbc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@7.0.3-1"
                }
            ],
            "aliases": [
                "CVE-2026-31688"
            ],
            "risk_score": 2.9,
            "exploitability": "0.5",
            "weighted_severity": "5.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3apf-j1g4-vfbr"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/355546?format=api",
            "vulnerability_id": "VCID-43df-n4rn-nua1",
            "summary": "",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31697.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31697.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31697",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01737",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02363",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02403",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31697"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31697",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31697"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2464427",
                    "reference_id": "2464427",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2464427"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1089393?format=api",
                    "purl": "pkg:deb/debian/linux@7.0.3-1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-dq8r-defv-hbg6"
                        },
                        {
                            "vulnerability": "VCID-n59e-jkf6-13bf"
                        },
                        {
                            "vulnerability": "VCID-p3vt-v7gj-gqbc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@7.0.3-1"
                }
            ],
            "aliases": [
                "CVE-2026-31697"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-43df-n4rn-nua1"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/355680?format=api",
            "vulnerability_id": "VCID-49sp-s742-dbe6",
            "summary": "kernel: ksmbd: fix use-after-free in __ksmbd_close_fd() via durable scavenger",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31718.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31718.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31718",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00044",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13136",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00057",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17769",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00057",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1787",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31718"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2464490",
                    "reference_id": "2464490",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2464490"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1089393?format=api",
                    "purl": "pkg:deb/debian/linux@7.0.3-1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-dq8r-defv-hbg6"
                        },
                        {
                            "vulnerability": "VCID-n59e-jkf6-13bf"
                        },
                        {
                            "vulnerability": "VCID-p3vt-v7gj-gqbc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@7.0.3-1"
                }
            ],
            "aliases": [
                "CVE-2026-31718"
            ],
            "risk_score": 1.9,
            "exploitability": "0.5",
            "weighted_severity": "3.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-49sp-s742-dbe6"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/355635?format=api",
            "vulnerability_id": "VCID-4a7s-trcw-nube",
            "summary": "kernel: fs/ntfs3: validate rec->used in journal-replay file record check",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31716.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31716.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31716",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01777",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02155",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02184",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31716"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2464382",
                    "reference_id": "2464382",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2464382"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1089393?format=api",
                    "purl": "pkg:deb/debian/linux@7.0.3-1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-dq8r-defv-hbg6"
                        },
                        {
                            "vulnerability": "VCID-n59e-jkf6-13bf"
                        },
                        {
                            "vulnerability": "VCID-p3vt-v7gj-gqbc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@7.0.3-1"
                }
            ],
            "aliases": [
                "CVE-2026-31716"
            ],
            "risk_score": 1.8,
            "exploitability": "0.5",
            "weighted_severity": "3.6",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4a7s-trcw-nube"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/355548?format=api",
            "vulnerability_id": "VCID-5t5f-4e1q-23bd",
            "summary": "",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31699.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31699.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31699",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01737",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02363",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02403",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31699"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31699",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31699"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2464372",
                    "reference_id": "2464372",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2464372"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1089393?format=api",
                    "purl": "pkg:deb/debian/linux@7.0.3-1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-dq8r-defv-hbg6"
                        },
                        {
                            "vulnerability": "VCID-n59e-jkf6-13bf"
                        },
                        {
                            "vulnerability": "VCID-p3vt-v7gj-gqbc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@7.0.3-1"
                }
            ],
            "aliases": [
                "CVE-2026-31699"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5t5f-4e1q-23bd"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/355551?format=api",
            "vulnerability_id": "VCID-7m8f-1q1y-6uap",
            "summary": "",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31702.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31702.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31702",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02363",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02403",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04829",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31702"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31702",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31702"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2464495",
                    "reference_id": "2464495",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2464495"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1089393?format=api",
                    "purl": "pkg:deb/debian/linux@7.0.3-1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-dq8r-defv-hbg6"
                        },
                        {
                            "vulnerability": "VCID-n59e-jkf6-13bf"
                        },
                        {
                            "vulnerability": "VCID-p3vt-v7gj-gqbc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@7.0.3-1"
                }
            ],
            "aliases": [
                "CVE-2026-31702"
            ],
            "risk_score": 1.4,
            "exploitability": "0.5",
            "weighted_severity": "2.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7m8f-1q1y-6uap"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/355643?format=api",
            "vulnerability_id": "VCID-9x33-33np-c7bv",
            "summary": "kernel: ksmbd: validate owner of durable handle on reconnect",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31717.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31717.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31717",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0004",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11936",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00045",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13634",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00045",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13719",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31717"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2464401",
                    "reference_id": "2464401",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2464401"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1089393?format=api",
                    "purl": "pkg:deb/debian/linux@7.0.3-1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-dq8r-defv-hbg6"
                        },
                        {
                            "vulnerability": "VCID-n59e-jkf6-13bf"
                        },
                        {
                            "vulnerability": "VCID-p3vt-v7gj-gqbc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@7.0.3-1"
                }
            ],
            "aliases": [
                "CVE-2026-31717"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9x33-33np-c7bv"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/355553?format=api",
            "vulnerability_id": "VCID-9zzh-5tb2-m7aa",
            "summary": "",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31715.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31715.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31715",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02363",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02403",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04061",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31715"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31715",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31715"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2464359",
                    "reference_id": "2464359",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2464359"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1089393?format=api",
                    "purl": "pkg:deb/debian/linux@7.0.3-1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-dq8r-defv-hbg6"
                        },
                        {
                            "vulnerability": "VCID-n59e-jkf6-13bf"
                        },
                        {
                            "vulnerability": "VCID-p3vt-v7gj-gqbc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@7.0.3-1"
                }
            ],
            "aliases": [
                "CVE-2026-31715"
            ],
            "risk_score": 1.4,
            "exploitability": "0.5",
            "weighted_severity": "2.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9zzh-5tb2-m7aa"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/355549?format=api",
            "vulnerability_id": "VCID-aaq7-t35x-t7gc",
            "summary": "",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31700.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31700.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31700",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01737",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01775",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01791",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31700"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31700",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31700"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2464358",
                    "reference_id": "2464358",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2464358"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1089393?format=api",
                    "purl": "pkg:deb/debian/linux@7.0.3-1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-dq8r-defv-hbg6"
                        },
                        {
                            "vulnerability": "VCID-n59e-jkf6-13bf"
                        },
                        {
                            "vulnerability": "VCID-p3vt-v7gj-gqbc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@7.0.3-1"
                }
            ],
            "aliases": [
                "CVE-2026-31700"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-aaq7-t35x-t7gc"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/355649?format=api",
            "vulnerability_id": "VCID-c5x4-1mbq-quch",
            "summary": "kernel: ksmbd: validate num_aces and harden ACE walk in smb_inherit_dacl()",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31706.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31706.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31706",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00043",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13031",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14909",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15001",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31706"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2464413",
                    "reference_id": "2464413",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2464413"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1089393?format=api",
                    "purl": "pkg:deb/debian/linux@7.0.3-1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-dq8r-defv-hbg6"
                        },
                        {
                            "vulnerability": "VCID-n59e-jkf6-13bf"
                        },
                        {
                            "vulnerability": "VCID-p3vt-v7gj-gqbc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@7.0.3-1"
                }
            ],
            "aliases": [
                "CVE-2026-31706"
            ],
            "risk_score": 1.8,
            "exploitability": "0.5",
            "weighted_severity": "3.5",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-c5x4-1mbq-quch"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/357521?format=api",
            "vulnerability_id": "VCID-c7wz-4crx-3fgt",
            "summary": "",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-43349.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-43349.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-43349",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04127",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-43349"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2468067",
                    "reference_id": "2468067",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2468067"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1089393?format=api",
                    "purl": "pkg:deb/debian/linux@7.0.3-1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-dq8r-defv-hbg6"
                        },
                        {
                            "vulnerability": "VCID-n59e-jkf6-13bf"
                        },
                        {
                            "vulnerability": "VCID-p3vt-v7gj-gqbc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@7.0.3-1"
                }
            ],
            "aliases": [
                "CVE-2026-43349"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-c7wz-4crx-3fgt"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/355658?format=api",
            "vulnerability_id": "VCID-dpjc-pacw-8bfq",
            "summary": "kernel: ksmbd: fix out-of-bounds write in smb2_get_ea() EA alignment",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31705.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31705.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31705",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00046",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13896",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.0006",
                            "scoring_system": "epss",
                            "scoring_elements": "0.18673",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.0006",
                            "scoring_system": "epss",
                            "scoring_elements": "0.18776",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31705"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2464434",
                    "reference_id": "2464434",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2464434"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1089393?format=api",
                    "purl": "pkg:deb/debian/linux@7.0.3-1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-dq8r-defv-hbg6"
                        },
                        {
                            "vulnerability": "VCID-n59e-jkf6-13bf"
                        },
                        {
                            "vulnerability": "VCID-p3vt-v7gj-gqbc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@7.0.3-1"
                }
            ],
            "aliases": [
                "CVE-2026-31705"
            ],
            "risk_score": 1.9,
            "exploitability": "0.5",
            "weighted_severity": "3.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dpjc-pacw-8bfq"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78028?format=api",
            "vulnerability_id": "VCID-dq8r-defv-hbg6",
            "summary": "kernel: nvme: memory corruption via unprivileged user passthrough",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6238.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6238.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-6238",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03114",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02981",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03092",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03054",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03076",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02996",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02785",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02789",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02809",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0278",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02761",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02757",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02742",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02754",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03063",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03058",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03048",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-6238"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2250834",
                    "reference_id": "2250834",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T17:15:22Z/"
                        }
                    ],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2250834"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6",
                    "reference_id": "cpe:/o:redhat:enterprise_linux:6",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7",
                    "reference_id": "cpe:/o:redhat:enterprise_linux:7",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8",
                    "reference_id": "cpe:/o:redhat:enterprise_linux:8",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9",
                    "reference_id": "cpe:/o:redhat:enterprise_linux:9",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9"
                },
                {
                    "reference_url": "https://access.redhat.com/security/cve/CVE-2023-6238",
                    "reference_id": "CVE-2023-6238",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T17:15:22Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/security/cve/CVE-2023-6238"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067255?format=api",
                    "purl": "pkg:deb/debian/linux@7.0-1~exp1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@7.0-1~exp1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1089393?format=api",
                    "purl": "pkg:deb/debian/linux@7.0.3-1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-dq8r-defv-hbg6"
                        },
                        {
                            "vulnerability": "VCID-n59e-jkf6-13bf"
                        },
                        {
                            "vulnerability": "VCID-p3vt-v7gj-gqbc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@7.0.3-1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1105438?format=api",
                    "purl": "pkg:deb/debian/linux@7.0.4-1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-dq8r-defv-hbg6"
                        },
                        {
                            "vulnerability": "VCID-n59e-jkf6-13bf"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@7.0.4-1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1105449?format=api",
                    "purl": "pkg:deb/debian/linux@7.1~rc2-1~exp1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@7.1~rc2-1~exp1"
                }
            ],
            "aliases": [
                "CVE-2023-6238"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "6.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dq8r-defv-hbg6"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/355639?format=api",
            "vulnerability_id": "VCID-f832-cd1v-x3dc",
            "summary": "kernel: fuse: abort on fatal signal during sync init",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31713.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31713.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31713",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0215",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0218",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04061",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31713"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2464392",
                    "reference_id": "2464392",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2464392"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1089393?format=api",
                    "purl": "pkg:deb/debian/linux@7.0.3-1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-dq8r-defv-hbg6"
                        },
                        {
                            "vulnerability": "VCID-n59e-jkf6-13bf"
                        },
                        {
                            "vulnerability": "VCID-p3vt-v7gj-gqbc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@7.0.3-1"
                }
            ],
            "aliases": [
                "CVE-2026-31713"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-f832-cd1v-x3dc"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/355547?format=api",
            "vulnerability_id": "VCID-hv1g-619g-4yhx",
            "summary": "",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31698.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31698.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31698",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01737",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02363",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02403",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31698"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31698",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31698"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2464415",
                    "reference_id": "2464415",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2464415"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1089393?format=api",
                    "purl": "pkg:deb/debian/linux@7.0.3-1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-dq8r-defv-hbg6"
                        },
                        {
                            "vulnerability": "VCID-n59e-jkf6-13bf"
                        },
                        {
                            "vulnerability": "VCID-p3vt-v7gj-gqbc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@7.0.3-1"
                }
            ],
            "aliases": [
                "CVE-2026-31698"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hv1g-619g-4yhx"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/355550?format=api",
            "vulnerability_id": "VCID-hxgq-6b1c-uff9",
            "summary": "",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31701.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31701.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31701",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02202",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02232",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04829",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31701"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31701",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31701"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2464380",
                    "reference_id": "2464380",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2464380"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1089393?format=api",
                    "purl": "pkg:deb/debian/linux@7.0.3-1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-dq8r-defv-hbg6"
                        },
                        {
                            "vulnerability": "VCID-n59e-jkf6-13bf"
                        },
                        {
                            "vulnerability": "VCID-p3vt-v7gj-gqbc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@7.0.3-1"
                }
            ],
            "aliases": [
                "CVE-2026-31701"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hxgq-6b1c-uff9"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/357522?format=api",
            "vulnerability_id": "VCID-n1gz-v4eb-vqec",
            "summary": "",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-43350.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-43350.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-43350",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04917",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-43350"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-43350",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-43350"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2468110",
                    "reference_id": "2468110",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2468110"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1089393?format=api",
                    "purl": "pkg:deb/debian/linux@7.0.3-1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-dq8r-defv-hbg6"
                        },
                        {
                            "vulnerability": "VCID-n59e-jkf6-13bf"
                        },
                        {
                            "vulnerability": "VCID-p3vt-v7gj-gqbc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@7.0.3-1"
                }
            ],
            "aliases": [
                "CVE-2026-43350"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-n1gz-v4eb-vqec"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/355545?format=api",
            "vulnerability_id": "VCID-n537-dmm4-7kas",
            "summary": "",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31696.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31696.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31696",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02363",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02403",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00021",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05767",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31696"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31696",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31696"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2464467",
                    "reference_id": "2464467",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2464467"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1089393?format=api",
                    "purl": "pkg:deb/debian/linux@7.0.3-1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-dq8r-defv-hbg6"
                        },
                        {
                            "vulnerability": "VCID-n59e-jkf6-13bf"
                        },
                        {
                            "vulnerability": "VCID-p3vt-v7gj-gqbc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@7.0.3-1"
                }
            ],
            "aliases": [
                "CVE-2026-31696"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-n537-dmm4-7kas"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79006?format=api",
            "vulnerability_id": "VCID-n59e-jkf6-13bf",
            "summary": "kernel: ntfs3 local privledge escalation if NTFS character set and remount and umount called simultaneously",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3238.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3238.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-3238",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0008",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23708",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0008",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23388",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.0008",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23336",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.0008",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23233",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.0008",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23317",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.0008",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23751",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0008",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23531",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0008",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23602",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0008",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23648",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0008",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23664",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0008",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23622",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0008",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23565",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0008",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23577",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0008",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23567",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0008",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23547",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0008",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23364",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.0008",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23353",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-3238"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2127927",
                    "reference_id": "2127927",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-01T13:32:12Z/"
                        }
                    ],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2127927"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067255?format=api",
                    "purl": "pkg:deb/debian/linux@7.0-1~exp1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@7.0-1~exp1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1089393?format=api",
                    "purl": "pkg:deb/debian/linux@7.0.3-1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-dq8r-defv-hbg6"
                        },
                        {
                            "vulnerability": "VCID-n59e-jkf6-13bf"
                        },
                        {
                            "vulnerability": "VCID-p3vt-v7gj-gqbc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@7.0.3-1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1105438?format=api",
                    "purl": "pkg:deb/debian/linux@7.0.4-1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-dq8r-defv-hbg6"
                        },
                        {
                            "vulnerability": "VCID-n59e-jkf6-13bf"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@7.0.4-1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1105449?format=api",
                    "purl": "pkg:deb/debian/linux@7.1~rc2-1~exp1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@7.1~rc2-1~exp1"
                }
            ],
            "aliases": [
                "CVE-2022-3238"
            ],
            "risk_score": 3.5,
            "exploitability": "0.5",
            "weighted_severity": "7.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-n59e-jkf6-13bf"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/355628?format=api",
            "vulnerability_id": "VCID-naqw-tuak-xqgc",
            "summary": "kernel: crypto: krb5enc - fix async decrypt skipping hash verification",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31719.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31719.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31719",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07616",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10614",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10681",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31719"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2464361",
                    "reference_id": "2464361",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2464361"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1089393?format=api",
                    "purl": "pkg:deb/debian/linux@7.0.3-1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-dq8r-defv-hbg6"
                        },
                        {
                            "vulnerability": "VCID-n59e-jkf6-13bf"
                        },
                        {
                            "vulnerability": "VCID-p3vt-v7gj-gqbc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@7.0.3-1"
                }
            ],
            "aliases": [
                "CVE-2026-31719"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-naqw-tuak-xqgc"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/72268?format=api",
            "vulnerability_id": "VCID-p3vt-v7gj-gqbc",
            "summary": "kernel: io_uring: check if iowq is killed before queuing",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-56709.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-56709.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-56709",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09547",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09275",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09424",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09479",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09446",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09407",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0932",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09475",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00037",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10962",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00037",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10803",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00037",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10977",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00037",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11039",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00037",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10863",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00037",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10939",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00037",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10993",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00037",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10994",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-56709"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56709",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56709"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2334795",
                    "reference_id": "2334795",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2334795"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:20518",
                    "reference_id": "RHSA-2025:20518",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:20518"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7379-1/",
                    "reference_id": "USN-7379-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7379-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7379-2/",
                    "reference_id": "USN-7379-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7379-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7380-1/",
                    "reference_id": "USN-7380-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7380-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7381-1/",
                    "reference_id": "USN-7381-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7381-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7382-1/",
                    "reference_id": "USN-7382-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7382-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7513-1/",
                    "reference_id": "USN-7513-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7513-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7513-2/",
                    "reference_id": "USN-7513-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7513-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7513-3/",
                    "reference_id": "USN-7513-3",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7513-3/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7513-4/",
                    "reference_id": "USN-7513-4",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7513-4/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7513-5/",
                    "reference_id": "USN-7513-5",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7513-5/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7514-1/",
                    "reference_id": "USN-7514-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7514-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7515-1/",
                    "reference_id": "USN-7515-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7515-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7515-2/",
                    "reference_id": "USN-7515-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7515-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7522-1/",
                    "reference_id": "USN-7522-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7522-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7523-1/",
                    "reference_id": "USN-7523-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7523-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7524-1/",
                    "reference_id": "USN-7524-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7524-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067255?format=api",
                    "purl": "pkg:deb/debian/linux@7.0-1~exp1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@7.0-1~exp1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1089393?format=api",
                    "purl": "pkg:deb/debian/linux@7.0.3-1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-dq8r-defv-hbg6"
                        },
                        {
                            "vulnerability": "VCID-n59e-jkf6-13bf"
                        },
                        {
                            "vulnerability": "VCID-p3vt-v7gj-gqbc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@7.0.3-1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1105438?format=api",
                    "purl": "pkg:deb/debian/linux@7.0.4-1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-dq8r-defv-hbg6"
                        },
                        {
                            "vulnerability": "VCID-n59e-jkf6-13bf"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@7.0.4-1"
                }
            ],
            "aliases": [
                "CVE-2024-56709"
            ],
            "risk_score": 2.0,
            "exploitability": "0.5",
            "weighted_severity": "4.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-p3vt-v7gj-gqbc"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/355544?format=api",
            "vulnerability_id": "VCID-rfwn-gj6g-ubbs",
            "summary": "",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31694.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31694.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31694",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01737",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02363",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02403",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31694"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31694",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31694"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2464503",
                    "reference_id": "2464503",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2464503"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1089393?format=api",
                    "purl": "pkg:deb/debian/linux@7.0.3-1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-dq8r-defv-hbg6"
                        },
                        {
                            "vulnerability": "VCID-n59e-jkf6-13bf"
                        },
                        {
                            "vulnerability": "VCID-p3vt-v7gj-gqbc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@7.0.3-1"
                }
            ],
            "aliases": [
                "CVE-2026-31694"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rfwn-gj6g-ubbs"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/357648?format=api",
            "vulnerability_id": "VCID-rmmf-ey8e-eubr",
            "summary": "",
            "references": [
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-43500",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-43500"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1089393?format=api",
                    "purl": "pkg:deb/debian/linux@7.0.3-1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-dq8r-defv-hbg6"
                        },
                        {
                            "vulnerability": "VCID-n59e-jkf6-13bf"
                        },
                        {
                            "vulnerability": "VCID-p3vt-v7gj-gqbc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@7.0.3-1"
                }
            ],
            "aliases": [
                "CVE-2026-43500"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rmmf-ey8e-eubr"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/355552?format=api",
            "vulnerability_id": "VCID-tm5u-v65w-8uep",
            "summary": "",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31708.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31708.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31708",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0004",
                            "scoring_system": "epss",
                            "scoring_elements": "0.118",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00043",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1304",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00043",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13118",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31708"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31708",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31708"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2464396",
                    "reference_id": "2464396",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2464396"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1089393?format=api",
                    "purl": "pkg:deb/debian/linux@7.0.3-1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-dq8r-defv-hbg6"
                        },
                        {
                            "vulnerability": "VCID-n59e-jkf6-13bf"
                        },
                        {
                            "vulnerability": "VCID-p3vt-v7gj-gqbc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@7.0.3-1"
                }
            ],
            "aliases": [
                "CVE-2026-31708"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tm5u-v65w-8uep"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/355636?format=api",
            "vulnerability_id": "VCID-wnxx-8abs-5ucw",
            "summary": "kernel: writeback: Fix use after free in inode_switch_wbs_work_fn()",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31703.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31703.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31703",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01666",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02177",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02206",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31703"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2464385",
                    "reference_id": "2464385",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2464385"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1089393?format=api",
                    "purl": "pkg:deb/debian/linux@7.0.3-1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-dq8r-defv-hbg6"
                        },
                        {
                            "vulnerability": "VCID-n59e-jkf6-13bf"
                        },
                        {
                            "vulnerability": "VCID-p3vt-v7gj-gqbc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@7.0.3-1"
                }
            ],
            "aliases": [
                "CVE-2026-31703"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wnxx-8abs-5ucw"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/355677?format=api",
            "vulnerability_id": "VCID-x7bw-5cam-kubb",
            "summary": "kernel: ksmbd: use check_add_overflow() to prevent u16 DACL size overflow",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31704.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31704.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31704",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02202",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02232",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04829",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31704"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2464482",
                    "reference_id": "2464482",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2464482"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1089393?format=api",
                    "purl": "pkg:deb/debian/linux@7.0.3-1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-dq8r-defv-hbg6"
                        },
                        {
                            "vulnerability": "VCID-n59e-jkf6-13bf"
                        },
                        {
                            "vulnerability": "VCID-p3vt-v7gj-gqbc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@7.0.3-1"
                }
            ],
            "aliases": [
                "CVE-2026-31704"
            ],
            "risk_score": 1.4,
            "exploitability": "0.5",
            "weighted_severity": "2.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-x7bw-5cam-kubb"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/357520?format=api",
            "vulnerability_id": "VCID-xbam-fvfs-fydw",
            "summary": "",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-43348.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-43348.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-43348",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05073",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-43348"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2468078",
                    "reference_id": "2468078",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2468078"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1089393?format=api",
                    "purl": "pkg:deb/debian/linux@7.0.3-1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-dq8r-defv-hbg6"
                        },
                        {
                            "vulnerability": "VCID-n59e-jkf6-13bf"
                        },
                        {
                            "vulnerability": "VCID-p3vt-v7gj-gqbc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@7.0.3-1"
                }
            ],
            "aliases": [
                "CVE-2026-43348"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xbam-fvfs-fydw"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/354929?format=api",
            "vulnerability_id": "VCID-xfew-wxwz-yka3",
            "summary": "Linux kernel double free in Xen privcmd driver",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31787.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "7.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31787.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31787",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02023",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02048",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00033",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0943",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31787"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31787",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31787"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2464092",
                    "reference_id": "2464092",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2464092"
                },
                {
                    "reference_url": "https://xenbits.xen.org/xsa/advisory-487.html",
                    "reference_id": "XSA-487",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://xenbits.xen.org/xsa/advisory-487.html"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1089393?format=api",
                    "purl": "pkg:deb/debian/linux@7.0.3-1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-dq8r-defv-hbg6"
                        },
                        {
                            "vulnerability": "VCID-n59e-jkf6-13bf"
                        },
                        {
                            "vulnerability": "VCID-p3vt-v7gj-gqbc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@7.0.3-1"
                }
            ],
            "aliases": [
                "CVE-2026-31787",
                "XSA-487"
            ],
            "risk_score": 3.3,
            "exploitability": "0.5",
            "weighted_severity": "6.6",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xfew-wxwz-yka3"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/355637?format=api",
            "vulnerability_id": "VCID-y28b-ghum-ykek",
            "summary": "kernel: f2fs: fix to avoid memory leak in f2fs_rename()",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31714.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31714.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31714",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02202",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02232",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04829",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31714"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2464386",
                    "reference_id": "2464386",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2464386"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1089393?format=api",
                    "purl": "pkg:deb/debian/linux@7.0.3-1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-dq8r-defv-hbg6"
                        },
                        {
                            "vulnerability": "VCID-n59e-jkf6-13bf"
                        },
                        {
                            "vulnerability": "VCID-p3vt-v7gj-gqbc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@7.0.3-1"
                }
            ],
            "aliases": [
                "CVE-2026-31714"
            ],
            "risk_score": 0.8,
            "exploitability": "0.5",
            "weighted_severity": "1.6",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-y28b-ghum-ykek"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/355663?format=api",
            "vulnerability_id": "VCID-y5aq-zmbx-suft",
            "summary": "kernel: ksmbd: require minimum ACE size in smb_check_perm_dacl()",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31712.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31712.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31712",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00043",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13031",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14909",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15001",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31712"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2464447",
                    "reference_id": "2464447",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2464447"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1089393?format=api",
                    "purl": "pkg:deb/debian/linux@7.0.3-1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-dq8r-defv-hbg6"
                        },
                        {
                            "vulnerability": "VCID-n59e-jkf6-13bf"
                        },
                        {
                            "vulnerability": "VCID-p3vt-v7gj-gqbc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@7.0.3-1"
                }
            ],
            "aliases": [
                "CVE-2026-31712"
            ],
            "risk_score": 2.1,
            "exploitability": "0.5",
            "weighted_severity": "4.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-y5aq-zmbx-suft"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/354927?format=api",
            "vulnerability_id": "VCID-zasa-vpjy-nyhm",
            "summary": "Linux kernel out of bounds read via Xen-related sysfs file",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31786.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31786.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31786",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01539",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02023",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02048",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31786"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31786",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31786"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2464096",
                    "reference_id": "2464096",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2464096"
                },
                {
                    "reference_url": "https://xenbits.xen.org/xsa/advisory-485.html",
                    "reference_id": "XSA-485",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://xenbits.xen.org/xsa/advisory-485.html"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1089393?format=api",
                    "purl": "pkg:deb/debian/linux@7.0.3-1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-dq8r-defv-hbg6"
                        },
                        {
                            "vulnerability": "VCID-n59e-jkf6-13bf"
                        },
                        {
                            "vulnerability": "VCID-p3vt-v7gj-gqbc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@7.0.3-1"
                }
            ],
            "aliases": [
                "CVE-2026-31786",
                "XSA-485"
            ],
            "risk_score": 3.2,
            "exploitability": "0.5",
            "weighted_severity": "6.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zasa-vpjy-nyhm"
        }
    ],
    "fixing_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/354532?format=api",
            "vulnerability_id": "VCID-11nd-2f5c-ybe1",
            "summary": "In the Linux kernel, the following vulnerability has been resolved:  smb: client: fix OOB reads parsing symlink error response  When a CREATE returns STATUS_STOPPED_ON_SYMLINK, smb2_check_message() returns success without any length validation, leaving the symlink parsers as the only defense against an untrusted server.  symlink_data() walks SMB 3.1.1 error contexts with the loop test \"p < end\", but reads p->ErrorId at offset 4 and p->ErrorDataLength at offset 0.  When the server-controlled ErrorDataLength advances p to within 1-7 bytes of end, the next iteration will read past it.  When the matching context is found, sym->SymLinkErrorTag is read at offset 4 from p->ErrorContextData with no check that the symlink header itself fits.  smb2_parse_symlink_response() then bounds-checks the substitute name using SMB2_SYMLINK_STRUCT_SIZE as the offset of PathBuffer from iov_base.  That value is computed as sizeof(smb2_err_rsp) + sizeof(smb2_symlink_err_rsp), which is correct only when ErrorContextCount == 0.  With at least one error context the symlink data sits 8 bytes deeper, and each skipped non-matching context shifts it further by 8 + ALIGN(ErrorDataLength, 8).  The check is too short, allowing the substitute name read to run past iov_len.  The out-of-bound heap bytes are UTF-16-decoded into the symlink target and returned to userspace via readlink(2).  Fix this all up by making the loops test require the full context header to fit, rejecting sym if its header runs past end, and bound the substitute name against the actual position of sym->PathBuffer rather than a fixed offset.  Because sub_offs and sub_len are 16bits, the pointer math will not overflow here with the new greater-than.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31613.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31613.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31613",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05227",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14928",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00053",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16407",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00053",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16183",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00053",
                            "scoring_system": "epss",
                            "scoring_elements": "0.163",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31613"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2461480",
                    "reference_id": "2461480",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2461480"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994368?format=api",
                    "purl": "pkg:deb/debian/linux@6.1.162-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.1.162-1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994375?format=api",
                    "purl": "pkg:deb/debian/linux@6.12.74-2~bpo12%2B1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.12.74-2~bpo12%252B1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1089478?format=api",
                    "purl": "pkg:deb/debian/linux@6.19.14-1~bpo13%2B1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.14-1~bpo13%252B1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1077786?format=api",
                    "purl": "pkg:deb/debian/linux@6.19.14-1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1apd-wwuv-cbem"
                        },
                        {
                            "vulnerability": "VCID-23s6-fs1s-4kfb"
                        },
                        {
                            "vulnerability": "VCID-359m-ajks-23ef"
                        },
                        {
                            "vulnerability": "VCID-3apf-j1g4-vfbr"
                        },
                        {
                            "vulnerability": "VCID-43df-n4rn-nua1"
                        },
                        {
                            "vulnerability": "VCID-49sp-s742-dbe6"
                        },
                        {
                            "vulnerability": "VCID-4a7s-trcw-nube"
                        },
                        {
                            "vulnerability": "VCID-5t5f-4e1q-23bd"
                        },
                        {
                            "vulnerability": "VCID-7m8f-1q1y-6uap"
                        },
                        {
                            "vulnerability": "VCID-9x33-33np-c7bv"
                        },
                        {
                            "vulnerability": "VCID-9zzh-5tb2-m7aa"
                        },
                        {
                            "vulnerability": "VCID-aaq7-t35x-t7gc"
                        },
                        {
                            "vulnerability": "VCID-c5x4-1mbq-quch"
                        },
                        {
                            "vulnerability": "VCID-c7wz-4crx-3fgt"
                        },
                        {
                            "vulnerability": "VCID-dpjc-pacw-8bfq"
                        },
                        {
                            "vulnerability": "VCID-dq8r-defv-hbg6"
                        },
                        {
                            "vulnerability": "VCID-f832-cd1v-x3dc"
                        },
                        {
                            "vulnerability": "VCID-hv1g-619g-4yhx"
                        },
                        {
                            "vulnerability": "VCID-hxgq-6b1c-uff9"
                        },
                        {
                            "vulnerability": "VCID-n1gz-v4eb-vqec"
                        },
                        {
                            "vulnerability": "VCID-n537-dmm4-7kas"
                        },
                        {
                            "vulnerability": "VCID-n59e-jkf6-13bf"
                        },
                        {
                            "vulnerability": "VCID-naqw-tuak-xqgc"
                        },
                        {
                            "vulnerability": "VCID-p3vt-v7gj-gqbc"
                        },
                        {
                            "vulnerability": "VCID-rfwn-gj6g-ubbs"
                        },
                        {
                            "vulnerability": "VCID-rmmf-ey8e-eubr"
                        },
                        {
                            "vulnerability": "VCID-tm5u-v65w-8uep"
                        },
                        {
                            "vulnerability": "VCID-wnxx-8abs-5ucw"
                        },
                        {
                            "vulnerability": "VCID-x7bw-5cam-kubb"
                        },
                        {
                            "vulnerability": "VCID-xbam-fvfs-fydw"
                        },
                        {
                            "vulnerability": "VCID-xfew-wxwz-yka3"
                        },
                        {
                            "vulnerability": "VCID-y28b-ghum-ykek"
                        },
                        {
                            "vulnerability": "VCID-y5aq-zmbx-suft"
                        },
                        {
                            "vulnerability": "VCID-zasa-vpjy-nyhm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.14-1"
                }
            ],
            "aliases": [
                "CVE-2026-31613"
            ],
            "risk_score": 3.2,
            "exploitability": "0.5",
            "weighted_severity": "6.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-11nd-2f5c-ybe1"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/355421?format=api",
            "vulnerability_id": "VCID-1n41-qg8u-r7d5",
            "summary": "",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31692.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31692.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31692",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0215",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0218",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00023",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06276",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31692"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31692",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31692"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2464093",
                    "reference_id": "2464093",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2464093"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994366?format=api",
                    "purl": "pkg:deb/debian/linux@6.1.4-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.1.4-1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994368?format=api",
                    "purl": "pkg:deb/debian/linux@6.1.162-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.1.162-1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994375?format=api",
                    "purl": "pkg:deb/debian/linux@6.12.74-2~bpo12%2B1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.12.74-2~bpo12%252B1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1089478?format=api",
                    "purl": "pkg:deb/debian/linux@6.19.14-1~bpo13%2B1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.14-1~bpo13%252B1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1077786?format=api",
                    "purl": "pkg:deb/debian/linux@6.19.14-1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1apd-wwuv-cbem"
                        },
                        {
                            "vulnerability": "VCID-23s6-fs1s-4kfb"
                        },
                        {
                            "vulnerability": "VCID-359m-ajks-23ef"
                        },
                        {
                            "vulnerability": "VCID-3apf-j1g4-vfbr"
                        },
                        {
                            "vulnerability": "VCID-43df-n4rn-nua1"
                        },
                        {
                            "vulnerability": "VCID-49sp-s742-dbe6"
                        },
                        {
                            "vulnerability": "VCID-4a7s-trcw-nube"
                        },
                        {
                            "vulnerability": "VCID-5t5f-4e1q-23bd"
                        },
                        {
                            "vulnerability": "VCID-7m8f-1q1y-6uap"
                        },
                        {
                            "vulnerability": "VCID-9x33-33np-c7bv"
                        },
                        {
                            "vulnerability": "VCID-9zzh-5tb2-m7aa"
                        },
                        {
                            "vulnerability": "VCID-aaq7-t35x-t7gc"
                        },
                        {
                            "vulnerability": "VCID-c5x4-1mbq-quch"
                        },
                        {
                            "vulnerability": "VCID-c7wz-4crx-3fgt"
                        },
                        {
                            "vulnerability": "VCID-dpjc-pacw-8bfq"
                        },
                        {
                            "vulnerability": "VCID-dq8r-defv-hbg6"
                        },
                        {
                            "vulnerability": "VCID-f832-cd1v-x3dc"
                        },
                        {
                            "vulnerability": "VCID-hv1g-619g-4yhx"
                        },
                        {
                            "vulnerability": "VCID-hxgq-6b1c-uff9"
                        },
                        {
                            "vulnerability": "VCID-n1gz-v4eb-vqec"
                        },
                        {
                            "vulnerability": "VCID-n537-dmm4-7kas"
                        },
                        {
                            "vulnerability": "VCID-n59e-jkf6-13bf"
                        },
                        {
                            "vulnerability": "VCID-naqw-tuak-xqgc"
                        },
                        {
                            "vulnerability": "VCID-p3vt-v7gj-gqbc"
                        },
                        {
                            "vulnerability": "VCID-rfwn-gj6g-ubbs"
                        },
                        {
                            "vulnerability": "VCID-rmmf-ey8e-eubr"
                        },
                        {
                            "vulnerability": "VCID-tm5u-v65w-8uep"
                        },
                        {
                            "vulnerability": "VCID-wnxx-8abs-5ucw"
                        },
                        {
                            "vulnerability": "VCID-x7bw-5cam-kubb"
                        },
                        {
                            "vulnerability": "VCID-xbam-fvfs-fydw"
                        },
                        {
                            "vulnerability": "VCID-xfew-wxwz-yka3"
                        },
                        {
                            "vulnerability": "VCID-y28b-ghum-ykek"
                        },
                        {
                            "vulnerability": "VCID-y5aq-zmbx-suft"
                        },
                        {
                            "vulnerability": "VCID-zasa-vpjy-nyhm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.14-1"
                }
            ],
            "aliases": [
                "CVE-2026-31692"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1n41-qg8u-r7d5"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/354497?format=api",
            "vulnerability_id": "VCID-22zu-qy6y-aub1",
            "summary": "In the Linux kernel, the following vulnerability has been resolved:  media: as102: fix to not free memory after the device is registered in as102_usb_probe()  In as102_usb driver, the following race condition occurs: ``` \t\tCPU0\t\t\t\t\t\tCPU1 as102_usb_probe()   kzalloc(); // alloc as102_dev_t   ....   usb_register_dev(); \t\t\t\t\t\tfd = sys_open(\"/path/to/dev\"); // open as102 fd \t\t\t\t\t\t....   usb_deregister_dev();   ....   kfree(); // free as102_dev_t   .... \t\t\t\t\t\tsys_close(fd); \t\t\t\t\t\t  as102_release() // UAF!! \t\t\t\t\t\t    as102_usb_release() \t\t\t\t\t\t      kfree(); // DFB!! ```  When a USB character device registered with usb_register_dev() is later unregistered (via usb_deregister_dev() or disconnect), the device node is removed so new open() calls fail. However, file descriptors that are already open do not go away immediately: they remain valid until the last reference is dropped and the driver's .release() is invoked.  In as102, as102_usb_probe() calls usb_register_dev() and then, on an error path, does usb_deregister_dev() and frees as102_dev_t right away. If userspace raced a successful open() before the deregistration, that open FD will later hit as102_release() --> as102_usb_release() and access or free as102_dev_t again, occur a race to use-after-free and double-free vuln.  The fix is to never kfree(as102_dev_t) directly once usb_register_dev() has succeeded. After deregistration, defer freeing memory to .release().  In other words, let release() perform the last kfree when the final open FD is closed.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31578.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31578.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31578",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.018",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02396",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0241",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0245",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0462",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31578"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31578",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31578"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2461576",
                    "reference_id": "2461576",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2461576"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994366?format=api",
                    "purl": "pkg:deb/debian/linux@6.1.4-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.1.4-1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994368?format=api",
                    "purl": "pkg:deb/debian/linux@6.1.162-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.1.162-1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994375?format=api",
                    "purl": "pkg:deb/debian/linux@6.12.74-2~bpo12%2B1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.12.74-2~bpo12%252B1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1089478?format=api",
                    "purl": "pkg:deb/debian/linux@6.19.14-1~bpo13%2B1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.14-1~bpo13%252B1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1077786?format=api",
                    "purl": "pkg:deb/debian/linux@6.19.14-1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1apd-wwuv-cbem"
                        },
                        {
                            "vulnerability": "VCID-23s6-fs1s-4kfb"
                        },
                        {
                            "vulnerability": "VCID-359m-ajks-23ef"
                        },
                        {
                            "vulnerability": "VCID-3apf-j1g4-vfbr"
                        },
                        {
                            "vulnerability": "VCID-43df-n4rn-nua1"
                        },
                        {
                            "vulnerability": "VCID-49sp-s742-dbe6"
                        },
                        {
                            "vulnerability": "VCID-4a7s-trcw-nube"
                        },
                        {
                            "vulnerability": "VCID-5t5f-4e1q-23bd"
                        },
                        {
                            "vulnerability": "VCID-7m8f-1q1y-6uap"
                        },
                        {
                            "vulnerability": "VCID-9x33-33np-c7bv"
                        },
                        {
                            "vulnerability": "VCID-9zzh-5tb2-m7aa"
                        },
                        {
                            "vulnerability": "VCID-aaq7-t35x-t7gc"
                        },
                        {
                            "vulnerability": "VCID-c5x4-1mbq-quch"
                        },
                        {
                            "vulnerability": "VCID-c7wz-4crx-3fgt"
                        },
                        {
                            "vulnerability": "VCID-dpjc-pacw-8bfq"
                        },
                        {
                            "vulnerability": "VCID-dq8r-defv-hbg6"
                        },
                        {
                            "vulnerability": "VCID-f832-cd1v-x3dc"
                        },
                        {
                            "vulnerability": "VCID-hv1g-619g-4yhx"
                        },
                        {
                            "vulnerability": "VCID-hxgq-6b1c-uff9"
                        },
                        {
                            "vulnerability": "VCID-n1gz-v4eb-vqec"
                        },
                        {
                            "vulnerability": "VCID-n537-dmm4-7kas"
                        },
                        {
                            "vulnerability": "VCID-n59e-jkf6-13bf"
                        },
                        {
                            "vulnerability": "VCID-naqw-tuak-xqgc"
                        },
                        {
                            "vulnerability": "VCID-p3vt-v7gj-gqbc"
                        },
                        {
                            "vulnerability": "VCID-rfwn-gj6g-ubbs"
                        },
                        {
                            "vulnerability": "VCID-rmmf-ey8e-eubr"
                        },
                        {
                            "vulnerability": "VCID-tm5u-v65w-8uep"
                        },
                        {
                            "vulnerability": "VCID-wnxx-8abs-5ucw"
                        },
                        {
                            "vulnerability": "VCID-x7bw-5cam-kubb"
                        },
                        {
                            "vulnerability": "VCID-xbam-fvfs-fydw"
                        },
                        {
                            "vulnerability": "VCID-xfew-wxwz-yka3"
                        },
                        {
                            "vulnerability": "VCID-y28b-ghum-ykek"
                        },
                        {
                            "vulnerability": "VCID-y5aq-zmbx-suft"
                        },
                        {
                            "vulnerability": "VCID-zasa-vpjy-nyhm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.14-1"
                }
            ],
            "aliases": [
                "CVE-2026-31578"
            ],
            "risk_score": 1.4,
            "exploitability": "0.5",
            "weighted_severity": "2.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-22zu-qy6y-aub1"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/354498?format=api",
            "vulnerability_id": "VCID-25at-2je8-2ufj",
            "summary": "In the Linux kernel, the following vulnerability has been resolved:  wireguard: device: use exit_rtnl callback instead of manual rtnl_lock in pre_exit  wg_netns_pre_exit() manually acquires rtnl_lock() inside the pernet .pre_exit callback.  This causes a hung task when another thread holds rtnl_mutex - the cleanup_net workqueue (or the setup_net failure rollback path) blocks indefinitely in wg_netns_pre_exit() waiting to acquire the lock.  Convert to .exit_rtnl, introduced in commit 7a60d91c690b (\"net: Add ->exit_rtnl() hook to struct pernet_operations.\"), where the framework already holds RTNL and batches all callbacks under a single rtnl_lock()/rtnl_unlock() pair, eliminating the contention window.  The rcu_assign_pointer(wg->creating_net, NULL) is safe to move from .pre_exit to .exit_rtnl (which runs after synchronize_rcu()) because all RCU readers of creating_net either use maybe_get_net() - which returns NULL for a dying namespace with zero refcount - or access net->user_ns which remains valid throughout the entire ops_undo_list sequence.  [ Jason: added __net_exit and __read_mostly annotations that were missing. ]",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31579.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31579.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31579",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0161",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02087",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02083",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02107",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0407",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31579"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31579",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31579"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2461496",
                    "reference_id": "2461496",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2461496"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994366?format=api",
                    "purl": "pkg:deb/debian/linux@6.1.4-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.1.4-1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994368?format=api",
                    "purl": "pkg:deb/debian/linux@6.1.162-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.1.162-1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994375?format=api",
                    "purl": "pkg:deb/debian/linux@6.12.74-2~bpo12%2B1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.12.74-2~bpo12%252B1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1089478?format=api",
                    "purl": "pkg:deb/debian/linux@6.19.14-1~bpo13%2B1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.14-1~bpo13%252B1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1077786?format=api",
                    "purl": "pkg:deb/debian/linux@6.19.14-1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1apd-wwuv-cbem"
                        },
                        {
                            "vulnerability": "VCID-23s6-fs1s-4kfb"
                        },
                        {
                            "vulnerability": "VCID-359m-ajks-23ef"
                        },
                        {
                            "vulnerability": "VCID-3apf-j1g4-vfbr"
                        },
                        {
                            "vulnerability": "VCID-43df-n4rn-nua1"
                        },
                        {
                            "vulnerability": "VCID-49sp-s742-dbe6"
                        },
                        {
                            "vulnerability": "VCID-4a7s-trcw-nube"
                        },
                        {
                            "vulnerability": "VCID-5t5f-4e1q-23bd"
                        },
                        {
                            "vulnerability": "VCID-7m8f-1q1y-6uap"
                        },
                        {
                            "vulnerability": "VCID-9x33-33np-c7bv"
                        },
                        {
                            "vulnerability": "VCID-9zzh-5tb2-m7aa"
                        },
                        {
                            "vulnerability": "VCID-aaq7-t35x-t7gc"
                        },
                        {
                            "vulnerability": "VCID-c5x4-1mbq-quch"
                        },
                        {
                            "vulnerability": "VCID-c7wz-4crx-3fgt"
                        },
                        {
                            "vulnerability": "VCID-dpjc-pacw-8bfq"
                        },
                        {
                            "vulnerability": "VCID-dq8r-defv-hbg6"
                        },
                        {
                            "vulnerability": "VCID-f832-cd1v-x3dc"
                        },
                        {
                            "vulnerability": "VCID-hv1g-619g-4yhx"
                        },
                        {
                            "vulnerability": "VCID-hxgq-6b1c-uff9"
                        },
                        {
                            "vulnerability": "VCID-n1gz-v4eb-vqec"
                        },
                        {
                            "vulnerability": "VCID-n537-dmm4-7kas"
                        },
                        {
                            "vulnerability": "VCID-n59e-jkf6-13bf"
                        },
                        {
                            "vulnerability": "VCID-naqw-tuak-xqgc"
                        },
                        {
                            "vulnerability": "VCID-p3vt-v7gj-gqbc"
                        },
                        {
                            "vulnerability": "VCID-rfwn-gj6g-ubbs"
                        },
                        {
                            "vulnerability": "VCID-rmmf-ey8e-eubr"
                        },
                        {
                            "vulnerability": "VCID-tm5u-v65w-8uep"
                        },
                        {
                            "vulnerability": "VCID-wnxx-8abs-5ucw"
                        },
                        {
                            "vulnerability": "VCID-x7bw-5cam-kubb"
                        },
                        {
                            "vulnerability": "VCID-xbam-fvfs-fydw"
                        },
                        {
                            "vulnerability": "VCID-xfew-wxwz-yka3"
                        },
                        {
                            "vulnerability": "VCID-y28b-ghum-ykek"
                        },
                        {
                            "vulnerability": "VCID-y5aq-zmbx-suft"
                        },
                        {
                            "vulnerability": "VCID-zasa-vpjy-nyhm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.14-1"
                }
            ],
            "aliases": [
                "CVE-2026-31579"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-25at-2je8-2ufj"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/354521?format=api",
            "vulnerability_id": "VCID-2cky-e16g-yqgf",
            "summary": "In the Linux kernel, the following vulnerability has been resolved:  ALSA: ctxfi: Limit PTP to a single page  Commit 391e69143d0a increased CT_PTP_NUM from 1 to 4 to support 256 playback streams, but the additional pages are not used by the card correctly. The CT20K2 hardware already has multiple VMEM_PTPAL registers, but using them separately would require refactoring the entire virtual memory allocation logic.  ct_vm_map() always uses PTEs in vm->ptp[0].area regardless of CT_PTP_NUM. On AMD64 systems, a single PTP covers 512 PTEs (2M). When aggregate memory allocations exceed this limit, ct_vm_map() tries to access beyond the allocated space and causes a page fault:    BUG: unable to handle page fault for address: ffffd4ae8a10a000   Oops: Oops: 0002 [#1] SMP PTI   RIP: 0010:ct_vm_map+0x17c/0x280 [snd_ctxfi]   Call Trace:   atc_pcm_playback_prepare+0x225/0x3b0   ct_pcm_playback_prepare+0x38/0x60   snd_pcm_do_prepare+0x2f/0x50   snd_pcm_action_single+0x36/0x90   snd_pcm_action_nonatomic+0xbf/0xd0   snd_pcm_ioctl+0x28/0x40   __x64_sys_ioctl+0x97/0xe0   do_syscall_64+0x81/0x610   entry_SYSCALL_64_after_hwframe+0x76/0x7e  Revert CT_PTP_NUM to 1. The 256 SRC_RESOURCE_NUM and playback_count remain unchanged.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31602.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31602.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31602",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.018",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02396",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0241",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0245",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0462",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31602"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31602",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31602"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2461507",
                    "reference_id": "2461507",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2461507"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994366?format=api",
                    "purl": "pkg:deb/debian/linux@6.1.4-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.1.4-1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994368?format=api",
                    "purl": "pkg:deb/debian/linux@6.1.162-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.1.162-1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994375?format=api",
                    "purl": "pkg:deb/debian/linux@6.12.74-2~bpo12%2B1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.12.74-2~bpo12%252B1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1089478?format=api",
                    "purl": "pkg:deb/debian/linux@6.19.14-1~bpo13%2B1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.14-1~bpo13%252B1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1077786?format=api",
                    "purl": "pkg:deb/debian/linux@6.19.14-1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1apd-wwuv-cbem"
                        },
                        {
                            "vulnerability": "VCID-23s6-fs1s-4kfb"
                        },
                        {
                            "vulnerability": "VCID-359m-ajks-23ef"
                        },
                        {
                            "vulnerability": "VCID-3apf-j1g4-vfbr"
                        },
                        {
                            "vulnerability": "VCID-43df-n4rn-nua1"
                        },
                        {
                            "vulnerability": "VCID-49sp-s742-dbe6"
                        },
                        {
                            "vulnerability": "VCID-4a7s-trcw-nube"
                        },
                        {
                            "vulnerability": "VCID-5t5f-4e1q-23bd"
                        },
                        {
                            "vulnerability": "VCID-7m8f-1q1y-6uap"
                        },
                        {
                            "vulnerability": "VCID-9x33-33np-c7bv"
                        },
                        {
                            "vulnerability": "VCID-9zzh-5tb2-m7aa"
                        },
                        {
                            "vulnerability": "VCID-aaq7-t35x-t7gc"
                        },
                        {
                            "vulnerability": "VCID-c5x4-1mbq-quch"
                        },
                        {
                            "vulnerability": "VCID-c7wz-4crx-3fgt"
                        },
                        {
                            "vulnerability": "VCID-dpjc-pacw-8bfq"
                        },
                        {
                            "vulnerability": "VCID-dq8r-defv-hbg6"
                        },
                        {
                            "vulnerability": "VCID-f832-cd1v-x3dc"
                        },
                        {
                            "vulnerability": "VCID-hv1g-619g-4yhx"
                        },
                        {
                            "vulnerability": "VCID-hxgq-6b1c-uff9"
                        },
                        {
                            "vulnerability": "VCID-n1gz-v4eb-vqec"
                        },
                        {
                            "vulnerability": "VCID-n537-dmm4-7kas"
                        },
                        {
                            "vulnerability": "VCID-n59e-jkf6-13bf"
                        },
                        {
                            "vulnerability": "VCID-naqw-tuak-xqgc"
                        },
                        {
                            "vulnerability": "VCID-p3vt-v7gj-gqbc"
                        },
                        {
                            "vulnerability": "VCID-rfwn-gj6g-ubbs"
                        },
                        {
                            "vulnerability": "VCID-rmmf-ey8e-eubr"
                        },
                        {
                            "vulnerability": "VCID-tm5u-v65w-8uep"
                        },
                        {
                            "vulnerability": "VCID-wnxx-8abs-5ucw"
                        },
                        {
                            "vulnerability": "VCID-x7bw-5cam-kubb"
                        },
                        {
                            "vulnerability": "VCID-xbam-fvfs-fydw"
                        },
                        {
                            "vulnerability": "VCID-xfew-wxwz-yka3"
                        },
                        {
                            "vulnerability": "VCID-y28b-ghum-ykek"
                        },
                        {
                            "vulnerability": "VCID-y5aq-zmbx-suft"
                        },
                        {
                            "vulnerability": "VCID-zasa-vpjy-nyhm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.14-1"
                }
            ],
            "aliases": [
                "CVE-2026-31602"
            ],
            "risk_score": 1.9,
            "exploitability": "0.5",
            "weighted_severity": "3.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2cky-e16g-yqgf"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/354531?format=api",
            "vulnerability_id": "VCID-2dp8-mmkf-w7dx",
            "summary": "In the Linux kernel, the following vulnerability has been resolved:  ksmbd: validate EaNameLength in smb2_get_ea()  smb2_get_ea() reads ea_req->EaNameLength from the client request and passes it directly to strncmp() as the comparison length without verifying that the length of the name really is the size of the input buffer received.  Fix this up by properly checking the size of the name based on the value received and the overall size of the request, to prevent a later strncmp() call to use the length as a \"trusted\" size of the buffer. Without this check, uninitialized heap values might be slowly leaked to the client.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31612.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31612.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31612",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0462",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10432",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00047",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14118",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00047",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1427",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00047",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14361",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31612"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2461571",
                    "reference_id": "2461571",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2461571"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994368?format=api",
                    "purl": "pkg:deb/debian/linux@6.1.162-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.1.162-1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994375?format=api",
                    "purl": "pkg:deb/debian/linux@6.12.74-2~bpo12%2B1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.12.74-2~bpo12%252B1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1089478?format=api",
                    "purl": "pkg:deb/debian/linux@6.19.14-1~bpo13%2B1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.14-1~bpo13%252B1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1077786?format=api",
                    "purl": "pkg:deb/debian/linux@6.19.14-1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1apd-wwuv-cbem"
                        },
                        {
                            "vulnerability": "VCID-23s6-fs1s-4kfb"
                        },
                        {
                            "vulnerability": "VCID-359m-ajks-23ef"
                        },
                        {
                            "vulnerability": "VCID-3apf-j1g4-vfbr"
                        },
                        {
                            "vulnerability": "VCID-43df-n4rn-nua1"
                        },
                        {
                            "vulnerability": "VCID-49sp-s742-dbe6"
                        },
                        {
                            "vulnerability": "VCID-4a7s-trcw-nube"
                        },
                        {
                            "vulnerability": "VCID-5t5f-4e1q-23bd"
                        },
                        {
                            "vulnerability": "VCID-7m8f-1q1y-6uap"
                        },
                        {
                            "vulnerability": "VCID-9x33-33np-c7bv"
                        },
                        {
                            "vulnerability": "VCID-9zzh-5tb2-m7aa"
                        },
                        {
                            "vulnerability": "VCID-aaq7-t35x-t7gc"
                        },
                        {
                            "vulnerability": "VCID-c5x4-1mbq-quch"
                        },
                        {
                            "vulnerability": "VCID-c7wz-4crx-3fgt"
                        },
                        {
                            "vulnerability": "VCID-dpjc-pacw-8bfq"
                        },
                        {
                            "vulnerability": "VCID-dq8r-defv-hbg6"
                        },
                        {
                            "vulnerability": "VCID-f832-cd1v-x3dc"
                        },
                        {
                            "vulnerability": "VCID-hv1g-619g-4yhx"
                        },
                        {
                            "vulnerability": "VCID-hxgq-6b1c-uff9"
                        },
                        {
                            "vulnerability": "VCID-n1gz-v4eb-vqec"
                        },
                        {
                            "vulnerability": "VCID-n537-dmm4-7kas"
                        },
                        {
                            "vulnerability": "VCID-n59e-jkf6-13bf"
                        },
                        {
                            "vulnerability": "VCID-naqw-tuak-xqgc"
                        },
                        {
                            "vulnerability": "VCID-p3vt-v7gj-gqbc"
                        },
                        {
                            "vulnerability": "VCID-rfwn-gj6g-ubbs"
                        },
                        {
                            "vulnerability": "VCID-rmmf-ey8e-eubr"
                        },
                        {
                            "vulnerability": "VCID-tm5u-v65w-8uep"
                        },
                        {
                            "vulnerability": "VCID-wnxx-8abs-5ucw"
                        },
                        {
                            "vulnerability": "VCID-x7bw-5cam-kubb"
                        },
                        {
                            "vulnerability": "VCID-xbam-fvfs-fydw"
                        },
                        {
                            "vulnerability": "VCID-xfew-wxwz-yka3"
                        },
                        {
                            "vulnerability": "VCID-y28b-ghum-ykek"
                        },
                        {
                            "vulnerability": "VCID-y5aq-zmbx-suft"
                        },
                        {
                            "vulnerability": "VCID-zasa-vpjy-nyhm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.14-1"
                }
            ],
            "aliases": [
                "CVE-2026-31612"
            ],
            "risk_score": 1.7,
            "exploitability": "0.5",
            "weighted_severity": "3.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2dp8-mmkf-w7dx"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/354534?format=api",
            "vulnerability_id": "VCID-31cj-5nhu-4qa9",
            "summary": "In the Linux kernel, the following vulnerability has been resolved:  usb: gadget: renesas_usb3: validate endpoint index in standard request handlers  The GET_STATUS and SET/CLEAR_FEATURE handlers extract the endpoint number from the host-supplied wIndex without any sort of validation. Fix this up by validating the number of endpoints actually match up with the number the device has before attempting to dereference a pointer based on this math.  This is just like what was done in commit ee0d382feb44 (\"usb: gadget: aspeed_udc: validate endpoint index for ast udc\") for the aspeed driver.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31615.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31615.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31615",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0359",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0462",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04574",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04603",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04642",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31615"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31615",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31615"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2461475",
                    "reference_id": "2461475",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2461475"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994366?format=api",
                    "purl": "pkg:deb/debian/linux@6.1.4-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.1.4-1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994368?format=api",
                    "purl": "pkg:deb/debian/linux@6.1.162-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.1.162-1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994375?format=api",
                    "purl": "pkg:deb/debian/linux@6.12.74-2~bpo12%2B1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.12.74-2~bpo12%252B1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1089478?format=api",
                    "purl": "pkg:deb/debian/linux@6.19.14-1~bpo13%2B1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.14-1~bpo13%252B1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1077786?format=api",
                    "purl": "pkg:deb/debian/linux@6.19.14-1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1apd-wwuv-cbem"
                        },
                        {
                            "vulnerability": "VCID-23s6-fs1s-4kfb"
                        },
                        {
                            "vulnerability": "VCID-359m-ajks-23ef"
                        },
                        {
                            "vulnerability": "VCID-3apf-j1g4-vfbr"
                        },
                        {
                            "vulnerability": "VCID-43df-n4rn-nua1"
                        },
                        {
                            "vulnerability": "VCID-49sp-s742-dbe6"
                        },
                        {
                            "vulnerability": "VCID-4a7s-trcw-nube"
                        },
                        {
                            "vulnerability": "VCID-5t5f-4e1q-23bd"
                        },
                        {
                            "vulnerability": "VCID-7m8f-1q1y-6uap"
                        },
                        {
                            "vulnerability": "VCID-9x33-33np-c7bv"
                        },
                        {
                            "vulnerability": "VCID-9zzh-5tb2-m7aa"
                        },
                        {
                            "vulnerability": "VCID-aaq7-t35x-t7gc"
                        },
                        {
                            "vulnerability": "VCID-c5x4-1mbq-quch"
                        },
                        {
                            "vulnerability": "VCID-c7wz-4crx-3fgt"
                        },
                        {
                            "vulnerability": "VCID-dpjc-pacw-8bfq"
                        },
                        {
                            "vulnerability": "VCID-dq8r-defv-hbg6"
                        },
                        {
                            "vulnerability": "VCID-f832-cd1v-x3dc"
                        },
                        {
                            "vulnerability": "VCID-hv1g-619g-4yhx"
                        },
                        {
                            "vulnerability": "VCID-hxgq-6b1c-uff9"
                        },
                        {
                            "vulnerability": "VCID-n1gz-v4eb-vqec"
                        },
                        {
                            "vulnerability": "VCID-n537-dmm4-7kas"
                        },
                        {
                            "vulnerability": "VCID-n59e-jkf6-13bf"
                        },
                        {
                            "vulnerability": "VCID-naqw-tuak-xqgc"
                        },
                        {
                            "vulnerability": "VCID-p3vt-v7gj-gqbc"
                        },
                        {
                            "vulnerability": "VCID-rfwn-gj6g-ubbs"
                        },
                        {
                            "vulnerability": "VCID-rmmf-ey8e-eubr"
                        },
                        {
                            "vulnerability": "VCID-tm5u-v65w-8uep"
                        },
                        {
                            "vulnerability": "VCID-wnxx-8abs-5ucw"
                        },
                        {
                            "vulnerability": "VCID-x7bw-5cam-kubb"
                        },
                        {
                            "vulnerability": "VCID-xbam-fvfs-fydw"
                        },
                        {
                            "vulnerability": "VCID-xfew-wxwz-yka3"
                        },
                        {
                            "vulnerability": "VCID-y28b-ghum-ykek"
                        },
                        {
                            "vulnerability": "VCID-y5aq-zmbx-suft"
                        },
                        {
                            "vulnerability": "VCID-zasa-vpjy-nyhm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.14-1"
                }
            ],
            "aliases": [
                "CVE-2026-31615"
            ],
            "risk_score": 1.5,
            "exploitability": "0.5",
            "weighted_severity": "3.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-31cj-5nhu-4qa9"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/354604?format=api",
            "vulnerability_id": "VCID-3mhu-519z-pbck",
            "summary": "",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31685.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31685.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31685",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0462",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00046",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14018",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.0006",
                            "scoring_system": "epss",
                            "scoring_elements": "0.18589",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.0006",
                            "scoring_system": "epss",
                            "scoring_elements": "0.18673",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.0006",
                            "scoring_system": "epss",
                            "scoring_elements": "0.18776",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31685"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31685",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31685"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2461759",
                    "reference_id": "2461759",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2461759"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994366?format=api",
                    "purl": "pkg:deb/debian/linux@6.1.4-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.1.4-1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994368?format=api",
                    "purl": "pkg:deb/debian/linux@6.1.162-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.1.162-1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994375?format=api",
                    "purl": "pkg:deb/debian/linux@6.12.74-2~bpo12%2B1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.12.74-2~bpo12%252B1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1089478?format=api",
                    "purl": "pkg:deb/debian/linux@6.19.14-1~bpo13%2B1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.14-1~bpo13%252B1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1077786?format=api",
                    "purl": "pkg:deb/debian/linux@6.19.14-1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1apd-wwuv-cbem"
                        },
                        {
                            "vulnerability": "VCID-23s6-fs1s-4kfb"
                        },
                        {
                            "vulnerability": "VCID-359m-ajks-23ef"
                        },
                        {
                            "vulnerability": "VCID-3apf-j1g4-vfbr"
                        },
                        {
                            "vulnerability": "VCID-43df-n4rn-nua1"
                        },
                        {
                            "vulnerability": "VCID-49sp-s742-dbe6"
                        },
                        {
                            "vulnerability": "VCID-4a7s-trcw-nube"
                        },
                        {
                            "vulnerability": "VCID-5t5f-4e1q-23bd"
                        },
                        {
                            "vulnerability": "VCID-7m8f-1q1y-6uap"
                        },
                        {
                            "vulnerability": "VCID-9x33-33np-c7bv"
                        },
                        {
                            "vulnerability": "VCID-9zzh-5tb2-m7aa"
                        },
                        {
                            "vulnerability": "VCID-aaq7-t35x-t7gc"
                        },
                        {
                            "vulnerability": "VCID-c5x4-1mbq-quch"
                        },
                        {
                            "vulnerability": "VCID-c7wz-4crx-3fgt"
                        },
                        {
                            "vulnerability": "VCID-dpjc-pacw-8bfq"
                        },
                        {
                            "vulnerability": "VCID-dq8r-defv-hbg6"
                        },
                        {
                            "vulnerability": "VCID-f832-cd1v-x3dc"
                        },
                        {
                            "vulnerability": "VCID-hv1g-619g-4yhx"
                        },
                        {
                            "vulnerability": "VCID-hxgq-6b1c-uff9"
                        },
                        {
                            "vulnerability": "VCID-n1gz-v4eb-vqec"
                        },
                        {
                            "vulnerability": "VCID-n537-dmm4-7kas"
                        },
                        {
                            "vulnerability": "VCID-n59e-jkf6-13bf"
                        },
                        {
                            "vulnerability": "VCID-naqw-tuak-xqgc"
                        },
                        {
                            "vulnerability": "VCID-p3vt-v7gj-gqbc"
                        },
                        {
                            "vulnerability": "VCID-rfwn-gj6g-ubbs"
                        },
                        {
                            "vulnerability": "VCID-rmmf-ey8e-eubr"
                        },
                        {
                            "vulnerability": "VCID-tm5u-v65w-8uep"
                        },
                        {
                            "vulnerability": "VCID-wnxx-8abs-5ucw"
                        },
                        {
                            "vulnerability": "VCID-x7bw-5cam-kubb"
                        },
                        {
                            "vulnerability": "VCID-xbam-fvfs-fydw"
                        },
                        {
                            "vulnerability": "VCID-xfew-wxwz-yka3"
                        },
                        {
                            "vulnerability": "VCID-y28b-ghum-ykek"
                        },
                        {
                            "vulnerability": "VCID-y5aq-zmbx-suft"
                        },
                        {
                            "vulnerability": "VCID-zasa-vpjy-nyhm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.14-1"
                }
            ],
            "aliases": [
                "CVE-2026-31685"
            ],
            "risk_score": 3.2,
            "exploitability": "0.5",
            "weighted_severity": "6.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3mhu-519z-pbck"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/354524?format=api",
            "vulnerability_id": "VCID-3qmn-b1w4-jkg4",
            "summary": "In the Linux kernel, the following vulnerability has been resolved:  fbdev: udlfb: avoid divide-by-zero on FBIOPUT_VSCREENINFO  Much like commit 19f953e74356 (\"fbdev: fb_pm2fb: Avoid potential divide by zero error\"), we also need to prevent that same crash from happening in the udlfb driver as it uses pixclock directly when dividing, which will crash.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31605.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31605.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31605",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02278",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02282",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02318",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0462",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06767",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31605"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31605",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31605"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2461511",
                    "reference_id": "2461511",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2461511"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994366?format=api",
                    "purl": "pkg:deb/debian/linux@6.1.4-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.1.4-1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994368?format=api",
                    "purl": "pkg:deb/debian/linux@6.1.162-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.1.162-1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994375?format=api",
                    "purl": "pkg:deb/debian/linux@6.12.74-2~bpo12%2B1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.12.74-2~bpo12%252B1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1089478?format=api",
                    "purl": "pkg:deb/debian/linux@6.19.14-1~bpo13%2B1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.14-1~bpo13%252B1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1077786?format=api",
                    "purl": "pkg:deb/debian/linux@6.19.14-1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1apd-wwuv-cbem"
                        },
                        {
                            "vulnerability": "VCID-23s6-fs1s-4kfb"
                        },
                        {
                            "vulnerability": "VCID-359m-ajks-23ef"
                        },
                        {
                            "vulnerability": "VCID-3apf-j1g4-vfbr"
                        },
                        {
                            "vulnerability": "VCID-43df-n4rn-nua1"
                        },
                        {
                            "vulnerability": "VCID-49sp-s742-dbe6"
                        },
                        {
                            "vulnerability": "VCID-4a7s-trcw-nube"
                        },
                        {
                            "vulnerability": "VCID-5t5f-4e1q-23bd"
                        },
                        {
                            "vulnerability": "VCID-7m8f-1q1y-6uap"
                        },
                        {
                            "vulnerability": "VCID-9x33-33np-c7bv"
                        },
                        {
                            "vulnerability": "VCID-9zzh-5tb2-m7aa"
                        },
                        {
                            "vulnerability": "VCID-aaq7-t35x-t7gc"
                        },
                        {
                            "vulnerability": "VCID-c5x4-1mbq-quch"
                        },
                        {
                            "vulnerability": "VCID-c7wz-4crx-3fgt"
                        },
                        {
                            "vulnerability": "VCID-dpjc-pacw-8bfq"
                        },
                        {
                            "vulnerability": "VCID-dq8r-defv-hbg6"
                        },
                        {
                            "vulnerability": "VCID-f832-cd1v-x3dc"
                        },
                        {
                            "vulnerability": "VCID-hv1g-619g-4yhx"
                        },
                        {
                            "vulnerability": "VCID-hxgq-6b1c-uff9"
                        },
                        {
                            "vulnerability": "VCID-n1gz-v4eb-vqec"
                        },
                        {
                            "vulnerability": "VCID-n537-dmm4-7kas"
                        },
                        {
                            "vulnerability": "VCID-n59e-jkf6-13bf"
                        },
                        {
                            "vulnerability": "VCID-naqw-tuak-xqgc"
                        },
                        {
                            "vulnerability": "VCID-p3vt-v7gj-gqbc"
                        },
                        {
                            "vulnerability": "VCID-rfwn-gj6g-ubbs"
                        },
                        {
                            "vulnerability": "VCID-rmmf-ey8e-eubr"
                        },
                        {
                            "vulnerability": "VCID-tm5u-v65w-8uep"
                        },
                        {
                            "vulnerability": "VCID-wnxx-8abs-5ucw"
                        },
                        {
                            "vulnerability": "VCID-x7bw-5cam-kubb"
                        },
                        {
                            "vulnerability": "VCID-xbam-fvfs-fydw"
                        },
                        {
                            "vulnerability": "VCID-xfew-wxwz-yka3"
                        },
                        {
                            "vulnerability": "VCID-y28b-ghum-ykek"
                        },
                        {
                            "vulnerability": "VCID-y5aq-zmbx-suft"
                        },
                        {
                            "vulnerability": "VCID-zasa-vpjy-nyhm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.14-1"
                }
            ],
            "aliases": [
                "CVE-2026-31605"
            ],
            "risk_score": 1.4,
            "exploitability": "0.5",
            "weighted_severity": "2.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3qmn-b1w4-jkg4"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/354510?format=api",
            "vulnerability_id": "VCID-3r34-452w-skc2",
            "summary": "In the Linux kernel, the following vulnerability has been resolved:  KVM: SEV: Lock all vCPUs when synchronzing VMSAs for SNP launch finish  Lock all vCPUs when synchronizing and encrypting VMSAs for SNP guests, as allowing userspace to manipulate and/or run a vCPU while its state is being synchronized would at best corrupt vCPU state, and at worst crash the host kernel.  Opportunistically assert that vcpu->mutex is held when synchronizing its VMSA (the SEV-ES path already locks vCPUs).",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31591.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "7.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31591.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31591",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0161",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02107",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02087",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02083",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0407",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31591"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31591",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31591"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2461489",
                    "reference_id": "2461489",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2461489"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994366?format=api",
                    "purl": "pkg:deb/debian/linux@6.1.4-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.1.4-1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994368?format=api",
                    "purl": "pkg:deb/debian/linux@6.1.162-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.1.162-1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994375?format=api",
                    "purl": "pkg:deb/debian/linux@6.12.74-2~bpo12%2B1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.12.74-2~bpo12%252B1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1089478?format=api",
                    "purl": "pkg:deb/debian/linux@6.19.14-1~bpo13%2B1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.14-1~bpo13%252B1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1077786?format=api",
                    "purl": "pkg:deb/debian/linux@6.19.14-1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1apd-wwuv-cbem"
                        },
                        {
                            "vulnerability": "VCID-23s6-fs1s-4kfb"
                        },
                        {
                            "vulnerability": "VCID-359m-ajks-23ef"
                        },
                        {
                            "vulnerability": "VCID-3apf-j1g4-vfbr"
                        },
                        {
                            "vulnerability": "VCID-43df-n4rn-nua1"
                        },
                        {
                            "vulnerability": "VCID-49sp-s742-dbe6"
                        },
                        {
                            "vulnerability": "VCID-4a7s-trcw-nube"
                        },
                        {
                            "vulnerability": "VCID-5t5f-4e1q-23bd"
                        },
                        {
                            "vulnerability": "VCID-7m8f-1q1y-6uap"
                        },
                        {
                            "vulnerability": "VCID-9x33-33np-c7bv"
                        },
                        {
                            "vulnerability": "VCID-9zzh-5tb2-m7aa"
                        },
                        {
                            "vulnerability": "VCID-aaq7-t35x-t7gc"
                        },
                        {
                            "vulnerability": "VCID-c5x4-1mbq-quch"
                        },
                        {
                            "vulnerability": "VCID-c7wz-4crx-3fgt"
                        },
                        {
                            "vulnerability": "VCID-dpjc-pacw-8bfq"
                        },
                        {
                            "vulnerability": "VCID-dq8r-defv-hbg6"
                        },
                        {
                            "vulnerability": "VCID-f832-cd1v-x3dc"
                        },
                        {
                            "vulnerability": "VCID-hv1g-619g-4yhx"
                        },
                        {
                            "vulnerability": "VCID-hxgq-6b1c-uff9"
                        },
                        {
                            "vulnerability": "VCID-n1gz-v4eb-vqec"
                        },
                        {
                            "vulnerability": "VCID-n537-dmm4-7kas"
                        },
                        {
                            "vulnerability": "VCID-n59e-jkf6-13bf"
                        },
                        {
                            "vulnerability": "VCID-naqw-tuak-xqgc"
                        },
                        {
                            "vulnerability": "VCID-p3vt-v7gj-gqbc"
                        },
                        {
                            "vulnerability": "VCID-rfwn-gj6g-ubbs"
                        },
                        {
                            "vulnerability": "VCID-rmmf-ey8e-eubr"
                        },
                        {
                            "vulnerability": "VCID-tm5u-v65w-8uep"
                        },
                        {
                            "vulnerability": "VCID-wnxx-8abs-5ucw"
                        },
                        {
                            "vulnerability": "VCID-x7bw-5cam-kubb"
                        },
                        {
                            "vulnerability": "VCID-xbam-fvfs-fydw"
                        },
                        {
                            "vulnerability": "VCID-xfew-wxwz-yka3"
                        },
                        {
                            "vulnerability": "VCID-y28b-ghum-ykek"
                        },
                        {
                            "vulnerability": "VCID-y5aq-zmbx-suft"
                        },
                        {
                            "vulnerability": "VCID-zasa-vpjy-nyhm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.14-1"
                }
            ],
            "aliases": [
                "CVE-2026-31591"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3r34-452w-skc2"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/354548?format=api",
            "vulnerability_id": "VCID-46pr-2cfb-mbhn",
            "summary": "In the Linux kernel, the following vulnerability has been resolved:  nfc: llcp: add missing return after LLCP_CLOSED checks  In nfc_llcp_recv_hdlc() and nfc_llcp_recv_disc(), when the socket state is LLCP_CLOSED, the code correctly calls release_sock() and nfc_llcp_sock_put() but fails to return. Execution falls through to the remainder of the function, which calls release_sock() and nfc_llcp_sock_put() again. This results in a double release_sock() and a refcount underflow via double nfc_llcp_sock_put(), leading to a use-after-free.  Add the missing return statements after the LLCP_CLOSED branches in both functions to prevent the fall-through.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31629.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31629.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31629",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04773",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0548",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06977",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07127",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07216",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31629"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31629",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31629"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2461553",
                    "reference_id": "2461553",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2461553"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994366?format=api",
                    "purl": "pkg:deb/debian/linux@6.1.4-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.1.4-1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994368?format=api",
                    "purl": "pkg:deb/debian/linux@6.1.162-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.1.162-1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994375?format=api",
                    "purl": "pkg:deb/debian/linux@6.12.74-2~bpo12%2B1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.12.74-2~bpo12%252B1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1089478?format=api",
                    "purl": "pkg:deb/debian/linux@6.19.14-1~bpo13%2B1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.14-1~bpo13%252B1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1077786?format=api",
                    "purl": "pkg:deb/debian/linux@6.19.14-1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1apd-wwuv-cbem"
                        },
                        {
                            "vulnerability": "VCID-23s6-fs1s-4kfb"
                        },
                        {
                            "vulnerability": "VCID-359m-ajks-23ef"
                        },
                        {
                            "vulnerability": "VCID-3apf-j1g4-vfbr"
                        },
                        {
                            "vulnerability": "VCID-43df-n4rn-nua1"
                        },
                        {
                            "vulnerability": "VCID-49sp-s742-dbe6"
                        },
                        {
                            "vulnerability": "VCID-4a7s-trcw-nube"
                        },
                        {
                            "vulnerability": "VCID-5t5f-4e1q-23bd"
                        },
                        {
                            "vulnerability": "VCID-7m8f-1q1y-6uap"
                        },
                        {
                            "vulnerability": "VCID-9x33-33np-c7bv"
                        },
                        {
                            "vulnerability": "VCID-9zzh-5tb2-m7aa"
                        },
                        {
                            "vulnerability": "VCID-aaq7-t35x-t7gc"
                        },
                        {
                            "vulnerability": "VCID-c5x4-1mbq-quch"
                        },
                        {
                            "vulnerability": "VCID-c7wz-4crx-3fgt"
                        },
                        {
                            "vulnerability": "VCID-dpjc-pacw-8bfq"
                        },
                        {
                            "vulnerability": "VCID-dq8r-defv-hbg6"
                        },
                        {
                            "vulnerability": "VCID-f832-cd1v-x3dc"
                        },
                        {
                            "vulnerability": "VCID-hv1g-619g-4yhx"
                        },
                        {
                            "vulnerability": "VCID-hxgq-6b1c-uff9"
                        },
                        {
                            "vulnerability": "VCID-n1gz-v4eb-vqec"
                        },
                        {
                            "vulnerability": "VCID-n537-dmm4-7kas"
                        },
                        {
                            "vulnerability": "VCID-n59e-jkf6-13bf"
                        },
                        {
                            "vulnerability": "VCID-naqw-tuak-xqgc"
                        },
                        {
                            "vulnerability": "VCID-p3vt-v7gj-gqbc"
                        },
                        {
                            "vulnerability": "VCID-rfwn-gj6g-ubbs"
                        },
                        {
                            "vulnerability": "VCID-rmmf-ey8e-eubr"
                        },
                        {
                            "vulnerability": "VCID-tm5u-v65w-8uep"
                        },
                        {
                            "vulnerability": "VCID-wnxx-8abs-5ucw"
                        },
                        {
                            "vulnerability": "VCID-x7bw-5cam-kubb"
                        },
                        {
                            "vulnerability": "VCID-xbam-fvfs-fydw"
                        },
                        {
                            "vulnerability": "VCID-xfew-wxwz-yka3"
                        },
                        {
                            "vulnerability": "VCID-y28b-ghum-ykek"
                        },
                        {
                            "vulnerability": "VCID-y5aq-zmbx-suft"
                        },
                        {
                            "vulnerability": "VCID-zasa-vpjy-nyhm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.14-1"
                }
            ],
            "aliases": [
                "CVE-2026-31629"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-46pr-2cfb-mbhn"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/354511?format=api",
            "vulnerability_id": "VCID-4e1f-qvnx-87fc",
            "summary": "In the Linux kernel, the following vulnerability has been resolved:  KVM: SEV: Protect *all* of sev_mem_enc_register_region() with kvm->lock  Take and hold kvm->lock for before checking sev_guest() in sev_mem_enc_register_region(), as sev_guest() isn't stable unless kvm->lock is held (or KVM can guarantee KVM_SEV_INIT{2} has completed and can't rollack state).  If KVM_SEV_INIT{2} fails, KVM can end up trying to add to a not-yet-initialized sev->regions_list, e.g. triggering a #GP    Oops: general protection fault, probably for non-canonical address 0xdffffc0000000000: 0000 [#1] SMP KASAN NOPTI   KASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007]   CPU: 110 UID: 0 PID: 72717 Comm: syz.15.11462 Tainted: G     U  W  O        6.16.0-smp-DEV #1 NONE   Tainted: [U]=USER, [W]=WARN, [O]=OOT_MODULE   Hardware name: Google, Inc. Arcadia_IT_80/Arcadia_IT_80, BIOS 12.52.0-0 10/28/2024   RIP: 0010:sev_mem_enc_register_region+0x3f0/0x4f0 ../include/linux/list.h:83   Code: <41> 80 3c 04 00 74 08 4c 89 ff e8 f1 c7 a2 00 49 39 ed 0f 84 c6 00   RSP: 0018:ffff88838647fbb8 EFLAGS: 00010256   RAX: dffffc0000000000 RBX: 1ffff92015cf1e0b RCX: dffffc0000000000   RDX: 0000000000000000 RSI: 0000000000001000 RDI: ffff888367870000   RBP: ffffc900ae78f050 R08: ffffea000d9e0007 R09: 1ffffd4001b3c000   R10: dffffc0000000000 R11: fffff94001b3c001 R12: 0000000000000000   R13: ffff8982ab0bde00 R14: ffffc900ae78f058 R15: 0000000000000000   FS:  00007f34e9dc66c0(0000) GS:ffff89ee64d33000(0000) knlGS:0000000000000000   CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033   CR2: 00007fe180adef98 CR3: 000000047210e000 CR4: 0000000000350ef0   Call Trace:    <TASK>    kvm_arch_vm_ioctl+0xa72/0x1240 ../arch/x86/kvm/x86.c:7371    kvm_vm_ioctl+0x649/0x990 ../virt/kvm/kvm_main.c:5363    __se_sys_ioctl+0x101/0x170 ../fs/ioctl.c:51    do_syscall_x64 ../arch/x86/entry/syscall_64.c:63 [inline]    do_syscall_64+0x6f/0x1f0 ../arch/x86/entry/syscall_64.c:94    entry_SYSCALL_64_after_hwframe+0x76/0x7e   RIP: 0033:0x7f34e9f7e9a9   Code: <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48   RSP: 002b:00007f34e9dc6038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010   RAX: ffffffffffffffda RBX: 00007f34ea1a6080 RCX: 00007f34e9f7e9a9   RDX: 0000200000000280 RSI: 000000008010aebb RDI: 0000000000000007   RBP: 00007f34ea000d69 R08: 0000000000000000 R09: 0000000000000000   R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000   R13: 0000000000000000 R14: 00007f34ea1a6080 R15: 00007ffce77197a8    </TASK>  with a syzlang reproducer that looks like:    syz_kvm_add_vcpu$x86(0x0, &(0x7f0000000040)={0x0, &(0x7f0000000180)=ANY=[], 0x70}) (async)   syz_kvm_add_vcpu$x86(0x0, &(0x7f0000000080)={0x0, &(0x7f0000000180)=ANY=[@ANYBLOB=\"...\"], 0x4f}) (async)   r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0)   r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)   r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0)   r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0)   ioctl$KVM_SET_CLOCK(r3, 0xc008aeba, &(0x7f0000000040)={0x1, 0x8, 0x0, 0x5625e9b0}) (async)   ioctl$KVM_SET_PIT2(r3, 0x8010aebb, &(0x7f0000000280)={[...], 0x5}) (async)   ioctl$KVM_SET_PIT2(r1, 0x4070aea0, 0x0) (async)   r4 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0)   openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) (async)   ioctl$KVM_SET_USER_MEMORY_REGION(r4, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) (async)   r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x2)   close(r0) (async)   openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x8000, 0x0) (async)   ioctl$KVM_SET_GUEST_DEBUG(r5, 0x4048ae9b, &(0x7f0000000300)={0x4376ea830d46549b, 0x0, [0x46, 0x0, 0x0, 0x0, 0x0, 0x1000]}) (async)   ioctl$KVM_RUN(r5, 0xae80, 0x0)  Opportunistically use guard() to avoid having to define a new error label and goto usage.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31592.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "7.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31592.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31592",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0161",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02107",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02087",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02083",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0407",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31592"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31592",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31592"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2461501",
                    "reference_id": "2461501",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2461501"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994366?format=api",
                    "purl": "pkg:deb/debian/linux@6.1.4-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.1.4-1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994368?format=api",
                    "purl": "pkg:deb/debian/linux@6.1.162-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.1.162-1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994375?format=api",
                    "purl": "pkg:deb/debian/linux@6.12.74-2~bpo12%2B1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.12.74-2~bpo12%252B1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1089478?format=api",
                    "purl": "pkg:deb/debian/linux@6.19.14-1~bpo13%2B1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.14-1~bpo13%252B1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1077786?format=api",
                    "purl": "pkg:deb/debian/linux@6.19.14-1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1apd-wwuv-cbem"
                        },
                        {
                            "vulnerability": "VCID-23s6-fs1s-4kfb"
                        },
                        {
                            "vulnerability": "VCID-359m-ajks-23ef"
                        },
                        {
                            "vulnerability": "VCID-3apf-j1g4-vfbr"
                        },
                        {
                            "vulnerability": "VCID-43df-n4rn-nua1"
                        },
                        {
                            "vulnerability": "VCID-49sp-s742-dbe6"
                        },
                        {
                            "vulnerability": "VCID-4a7s-trcw-nube"
                        },
                        {
                            "vulnerability": "VCID-5t5f-4e1q-23bd"
                        },
                        {
                            "vulnerability": "VCID-7m8f-1q1y-6uap"
                        },
                        {
                            "vulnerability": "VCID-9x33-33np-c7bv"
                        },
                        {
                            "vulnerability": "VCID-9zzh-5tb2-m7aa"
                        },
                        {
                            "vulnerability": "VCID-aaq7-t35x-t7gc"
                        },
                        {
                            "vulnerability": "VCID-c5x4-1mbq-quch"
                        },
                        {
                            "vulnerability": "VCID-c7wz-4crx-3fgt"
                        },
                        {
                            "vulnerability": "VCID-dpjc-pacw-8bfq"
                        },
                        {
                            "vulnerability": "VCID-dq8r-defv-hbg6"
                        },
                        {
                            "vulnerability": "VCID-f832-cd1v-x3dc"
                        },
                        {
                            "vulnerability": "VCID-hv1g-619g-4yhx"
                        },
                        {
                            "vulnerability": "VCID-hxgq-6b1c-uff9"
                        },
                        {
                            "vulnerability": "VCID-n1gz-v4eb-vqec"
                        },
                        {
                            "vulnerability": "VCID-n537-dmm4-7kas"
                        },
                        {
                            "vulnerability": "VCID-n59e-jkf6-13bf"
                        },
                        {
                            "vulnerability": "VCID-naqw-tuak-xqgc"
                        },
                        {
                            "vulnerability": "VCID-p3vt-v7gj-gqbc"
                        },
                        {
                            "vulnerability": "VCID-rfwn-gj6g-ubbs"
                        },
                        {
                            "vulnerability": "VCID-rmmf-ey8e-eubr"
                        },
                        {
                            "vulnerability": "VCID-tm5u-v65w-8uep"
                        },
                        {
                            "vulnerability": "VCID-wnxx-8abs-5ucw"
                        },
                        {
                            "vulnerability": "VCID-x7bw-5cam-kubb"
                        },
                        {
                            "vulnerability": "VCID-xbam-fvfs-fydw"
                        },
                        {
                            "vulnerability": "VCID-xfew-wxwz-yka3"
                        },
                        {
                            "vulnerability": "VCID-y28b-ghum-ykek"
                        },
                        {
                            "vulnerability": "VCID-y5aq-zmbx-suft"
                        },
                        {
                            "vulnerability": "VCID-zasa-vpjy-nyhm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.14-1"
                }
            ],
            "aliases": [
                "CVE-2026-31592"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4e1f-qvnx-87fc"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/354507?format=api",
            "vulnerability_id": "VCID-4v3t-8s2w-rfbg",
            "summary": "In the Linux kernel, the following vulnerability has been resolved:  KVM: x86: Use scratch field in MMIO fragment to hold small write values  When exiting to userspace to service an emulated MMIO write, copy the to-be-written value to a scratch field in the MMIO fragment if the size of the data payload is 8 bytes or less, i.e. can fit in a single chunk, instead of pointing the fragment directly at the source value.  This fixes a class of use-after-free bugs that occur when the emulator initiates a write using an on-stack, local variable as the source, the write splits a page boundary, *and* both pages are MMIO pages.  Because KVM's ABI only allows for physically contiguous MMIO requests, accesses that split MMIO pages are separated into two fragments, and are sent to userspace one at a time.  When KVM attempts to complete userspace MMIO in response to KVM_RUN after the first fragment, KVM will detect the second fragment and generate a second userspace exit, and reference the on-stack variable.  The issue is most visible if the second KVM_RUN is performed by a separate task, in which case the stack of the initiating task can show up as truly freed data.    ==================================================================   BUG: KASAN: use-after-free in complete_emulated_mmio+0x305/0x420   Read of size 1 at addr ffff888009c378d1 by task syz-executor417/984    CPU: 1 PID: 984 Comm: syz-executor417 Not tainted 5.10.0-182.0.0.95.h2627.eulerosv2r13.x86_64 #3   Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.15.0-0-g2dd4b9b3f840-prebuilt.qemu.org 04/01/2014 Call Trace:   dump_stack+0xbe/0xfd   print_address_description.constprop.0+0x19/0x170   __kasan_report.cold+0x6c/0x84   kasan_report+0x3a/0x50   check_memory_region+0xfd/0x1f0   memcpy+0x20/0x60   complete_emulated_mmio+0x305/0x420   kvm_arch_vcpu_ioctl_run+0x63f/0x6d0   kvm_vcpu_ioctl+0x413/0xb20   __se_sys_ioctl+0x111/0x160   do_syscall_64+0x30/0x40   entry_SYSCALL_64_after_hwframe+0x67/0xd1   RIP: 0033:0x42477d   Code: <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48   RSP: 002b:00007faa8e6890e8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010   RAX: ffffffffffffffda RBX: 00000000004d7338 RCX: 000000000042477d   RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000005   RBP: 00000000004d7330 R08: 00007fff28d546df R09: 0000000000000000   R10: 0000000000000000 R11: 0000000000000246 R12: 00000000004d733c   R13: 0000000000000000 R14: 000000000040a200 R15: 00007fff28d54720    The buggy address belongs to the page:   page:0000000029f6a428 refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x9c37   flags: 0xfffffc0000000(node=0|zone=1|lastcpupid=0x1fffff)   raw: 000fffffc0000000 0000000000000000 ffffea0000270dc8 0000000000000000   raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 page dumped because: kasan: bad access detected    Memory state around the buggy address:   ffff888009c37780: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff   ffff888009c37800: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff   >ffff888009c37880: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff                                                    ^   ffff888009c37900: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff   ffff888009c37980: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff   ==================================================================  The bug can also be reproduced with a targeted KVM-Unit-Test by hacking KVM to fill a large on-stack variable in complete_emulated_mmio(), i.e. by overwrite the data value with garbage.  Limit the use of the scratch fields to 8-byte or smaller accesses, and to just writes, as larger accesses and reads are not affected thanks to implementation details in the emulator, but add a sanity check to ensure those details don't change in the future.  Specifically, KVM never uses on-stack variables for accesses larger that 8 bytes, e.g. uses an operand in the emulator context, and *al ---truncated---",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31588.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:H"
                        },
                        {
                            "value": "7.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31588.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31588",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.018",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0245",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02396",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0241",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0462",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31588"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31588",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31588"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2461458",
                    "reference_id": "2461458",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2461458"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994366?format=api",
                    "purl": "pkg:deb/debian/linux@6.1.4-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.1.4-1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994368?format=api",
                    "purl": "pkg:deb/debian/linux@6.1.162-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.1.162-1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994375?format=api",
                    "purl": "pkg:deb/debian/linux@6.12.74-2~bpo12%2B1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.12.74-2~bpo12%252B1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1089478?format=api",
                    "purl": "pkg:deb/debian/linux@6.19.14-1~bpo13%2B1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.14-1~bpo13%252B1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1077786?format=api",
                    "purl": "pkg:deb/debian/linux@6.19.14-1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1apd-wwuv-cbem"
                        },
                        {
                            "vulnerability": "VCID-23s6-fs1s-4kfb"
                        },
                        {
                            "vulnerability": "VCID-359m-ajks-23ef"
                        },
                        {
                            "vulnerability": "VCID-3apf-j1g4-vfbr"
                        },
                        {
                            "vulnerability": "VCID-43df-n4rn-nua1"
                        },
                        {
                            "vulnerability": "VCID-49sp-s742-dbe6"
                        },
                        {
                            "vulnerability": "VCID-4a7s-trcw-nube"
                        },
                        {
                            "vulnerability": "VCID-5t5f-4e1q-23bd"
                        },
                        {
                            "vulnerability": "VCID-7m8f-1q1y-6uap"
                        },
                        {
                            "vulnerability": "VCID-9x33-33np-c7bv"
                        },
                        {
                            "vulnerability": "VCID-9zzh-5tb2-m7aa"
                        },
                        {
                            "vulnerability": "VCID-aaq7-t35x-t7gc"
                        },
                        {
                            "vulnerability": "VCID-c5x4-1mbq-quch"
                        },
                        {
                            "vulnerability": "VCID-c7wz-4crx-3fgt"
                        },
                        {
                            "vulnerability": "VCID-dpjc-pacw-8bfq"
                        },
                        {
                            "vulnerability": "VCID-dq8r-defv-hbg6"
                        },
                        {
                            "vulnerability": "VCID-f832-cd1v-x3dc"
                        },
                        {
                            "vulnerability": "VCID-hv1g-619g-4yhx"
                        },
                        {
                            "vulnerability": "VCID-hxgq-6b1c-uff9"
                        },
                        {
                            "vulnerability": "VCID-n1gz-v4eb-vqec"
                        },
                        {
                            "vulnerability": "VCID-n537-dmm4-7kas"
                        },
                        {
                            "vulnerability": "VCID-n59e-jkf6-13bf"
                        },
                        {
                            "vulnerability": "VCID-naqw-tuak-xqgc"
                        },
                        {
                            "vulnerability": "VCID-p3vt-v7gj-gqbc"
                        },
                        {
                            "vulnerability": "VCID-rfwn-gj6g-ubbs"
                        },
                        {
                            "vulnerability": "VCID-rmmf-ey8e-eubr"
                        },
                        {
                            "vulnerability": "VCID-tm5u-v65w-8uep"
                        },
                        {
                            "vulnerability": "VCID-wnxx-8abs-5ucw"
                        },
                        {
                            "vulnerability": "VCID-x7bw-5cam-kubb"
                        },
                        {
                            "vulnerability": "VCID-xbam-fvfs-fydw"
                        },
                        {
                            "vulnerability": "VCID-xfew-wxwz-yka3"
                        },
                        {
                            "vulnerability": "VCID-y28b-ghum-ykek"
                        },
                        {
                            "vulnerability": "VCID-y5aq-zmbx-suft"
                        },
                        {
                            "vulnerability": "VCID-zasa-vpjy-nyhm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.14-1"
                }
            ],
            "aliases": [
                "CVE-2026-31588"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4v3t-8s2w-rfbg"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/354523?format=api",
            "vulnerability_id": "VCID-5vkh-dbsm-vbgu",
            "summary": "In the Linux kernel, the following vulnerability has been resolved:  wifi: rtw88: fix device leak on probe failure  Driver core holds a reference to the USB interface and its parent USB device while the interface is bound to a driver and there is no need to take additional references unless the structures are needed after disconnect.  This driver takes a reference to the USB device during probe but does not to release it on all probe errors (e.g. when descriptor parsing fails).  Drop the redundant device reference to fix the leak, reduce cargo culting, make it easier to spot drivers where an extra reference is needed, and reduce the risk of further memory leaks.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31604.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31604.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31604",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02282",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02318",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02278",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05659",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00028",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0788",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31604"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31604",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31604"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2461446",
                    "reference_id": "2461446",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2461446"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994366?format=api",
                    "purl": "pkg:deb/debian/linux@6.1.4-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.1.4-1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994368?format=api",
                    "purl": "pkg:deb/debian/linux@6.1.162-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.1.162-1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994375?format=api",
                    "purl": "pkg:deb/debian/linux@6.12.74-2~bpo12%2B1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.12.74-2~bpo12%252B1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1089478?format=api",
                    "purl": "pkg:deb/debian/linux@6.19.14-1~bpo13%2B1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.14-1~bpo13%252B1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1077786?format=api",
                    "purl": "pkg:deb/debian/linux@6.19.14-1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1apd-wwuv-cbem"
                        },
                        {
                            "vulnerability": "VCID-23s6-fs1s-4kfb"
                        },
                        {
                            "vulnerability": "VCID-359m-ajks-23ef"
                        },
                        {
                            "vulnerability": "VCID-3apf-j1g4-vfbr"
                        },
                        {
                            "vulnerability": "VCID-43df-n4rn-nua1"
                        },
                        {
                            "vulnerability": "VCID-49sp-s742-dbe6"
                        },
                        {
                            "vulnerability": "VCID-4a7s-trcw-nube"
                        },
                        {
                            "vulnerability": "VCID-5t5f-4e1q-23bd"
                        },
                        {
                            "vulnerability": "VCID-7m8f-1q1y-6uap"
                        },
                        {
                            "vulnerability": "VCID-9x33-33np-c7bv"
                        },
                        {
                            "vulnerability": "VCID-9zzh-5tb2-m7aa"
                        },
                        {
                            "vulnerability": "VCID-aaq7-t35x-t7gc"
                        },
                        {
                            "vulnerability": "VCID-c5x4-1mbq-quch"
                        },
                        {
                            "vulnerability": "VCID-c7wz-4crx-3fgt"
                        },
                        {
                            "vulnerability": "VCID-dpjc-pacw-8bfq"
                        },
                        {
                            "vulnerability": "VCID-dq8r-defv-hbg6"
                        },
                        {
                            "vulnerability": "VCID-f832-cd1v-x3dc"
                        },
                        {
                            "vulnerability": "VCID-hv1g-619g-4yhx"
                        },
                        {
                            "vulnerability": "VCID-hxgq-6b1c-uff9"
                        },
                        {
                            "vulnerability": "VCID-n1gz-v4eb-vqec"
                        },
                        {
                            "vulnerability": "VCID-n537-dmm4-7kas"
                        },
                        {
                            "vulnerability": "VCID-n59e-jkf6-13bf"
                        },
                        {
                            "vulnerability": "VCID-naqw-tuak-xqgc"
                        },
                        {
                            "vulnerability": "VCID-p3vt-v7gj-gqbc"
                        },
                        {
                            "vulnerability": "VCID-rfwn-gj6g-ubbs"
                        },
                        {
                            "vulnerability": "VCID-rmmf-ey8e-eubr"
                        },
                        {
                            "vulnerability": "VCID-tm5u-v65w-8uep"
                        },
                        {
                            "vulnerability": "VCID-wnxx-8abs-5ucw"
                        },
                        {
                            "vulnerability": "VCID-x7bw-5cam-kubb"
                        },
                        {
                            "vulnerability": "VCID-xbam-fvfs-fydw"
                        },
                        {
                            "vulnerability": "VCID-xfew-wxwz-yka3"
                        },
                        {
                            "vulnerability": "VCID-y28b-ghum-ykek"
                        },
                        {
                            "vulnerability": "VCID-y5aq-zmbx-suft"
                        },
                        {
                            "vulnerability": "VCID-zasa-vpjy-nyhm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.14-1"
                }
            ],
            "aliases": [
                "CVE-2026-31604"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5vkh-dbsm-vbgu"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/354512?format=api",
            "vulnerability_id": "VCID-656s-tkaz-m7bj",
            "summary": "In the Linux kernel, the following vulnerability has been resolved:  KVM: SEV: Reject attempts to sync VMSA of an already-launched/encrypted vCPU  Reject synchronizing vCPU state to its associated VMSA if the vCPU has already been launched, i.e. if the VMSA has already been encrypted.  On a host with SNP enabled, accessing guest-private memory generates an RMP #PF and panics the host.    BUG: unable to handle page fault for address: ff1276cbfdf36000   #PF: supervisor write access in kernel mode   #PF: error_code(0x80000003) - RMP violation   PGD 5a31801067 P4D 5a31802067 PUD 40ccfb5063 PMD 40e5954063 PTE 80000040fdf36163   SEV-SNP: PFN 0x40fdf36, RMP entry: [0x6010fffffffff001 - 0x000000000000001f]   Oops: Oops: 0003 [#1] SMP NOPTI   CPU: 33 UID: 0 PID: 996180 Comm: qemu-system-x86 Tainted: G           OE   Tainted: [O]=OOT_MODULE, [E]=UNSIGNED_MODULE   Hardware name: Dell Inc. PowerEdge R7625/0H1TJT, BIOS 1.5.8 07/21/2023   RIP: 0010:sev_es_sync_vmsa+0x54/0x4c0 [kvm_amd]   Call Trace:    <TASK>    snp_launch_update_vmsa+0x19d/0x290 [kvm_amd]    snp_launch_finish+0xb6/0x380 [kvm_amd]    sev_mem_enc_ioctl+0x14e/0x720 [kvm_amd]    kvm_arch_vm_ioctl+0x837/0xcf0 [kvm]    kvm_vm_ioctl+0x3fd/0xcc0 [kvm]    __x64_sys_ioctl+0xa3/0x100    x64_sys_call+0xfe0/0x2350    do_syscall_64+0x81/0x10f0    entry_SYSCALL_64_after_hwframe+0x76/0x7e   RIP: 0033:0x7ffff673287d    </TASK>  Note, the KVM flaw has been present since commit ad73109ae7ec (\"KVM: SVM: Provide support to launch and run an SEV-ES guest\"), but has only been actively dangerous for the host since SNP support was added.  With SEV-ES, KVM would \"just\" clobber guest state, which is totally fine from a host kernel perspective since userspace can clobber guest state any time before sev_launch_update_vmsa().",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31593.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "7.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31593.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31593",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02197",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02202",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02232",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04832",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0462",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31593"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31593",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31593"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2461536",
                    "reference_id": "2461536",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2461536"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994366?format=api",
                    "purl": "pkg:deb/debian/linux@6.1.4-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.1.4-1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994368?format=api",
                    "purl": "pkg:deb/debian/linux@6.1.162-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.1.162-1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994375?format=api",
                    "purl": "pkg:deb/debian/linux@6.12.74-2~bpo12%2B1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.12.74-2~bpo12%252B1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1089478?format=api",
                    "purl": "pkg:deb/debian/linux@6.19.14-1~bpo13%2B1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.14-1~bpo13%252B1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1077786?format=api",
                    "purl": "pkg:deb/debian/linux@6.19.14-1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1apd-wwuv-cbem"
                        },
                        {
                            "vulnerability": "VCID-23s6-fs1s-4kfb"
                        },
                        {
                            "vulnerability": "VCID-359m-ajks-23ef"
                        },
                        {
                            "vulnerability": "VCID-3apf-j1g4-vfbr"
                        },
                        {
                            "vulnerability": "VCID-43df-n4rn-nua1"
                        },
                        {
                            "vulnerability": "VCID-49sp-s742-dbe6"
                        },
                        {
                            "vulnerability": "VCID-4a7s-trcw-nube"
                        },
                        {
                            "vulnerability": "VCID-5t5f-4e1q-23bd"
                        },
                        {
                            "vulnerability": "VCID-7m8f-1q1y-6uap"
                        },
                        {
                            "vulnerability": "VCID-9x33-33np-c7bv"
                        },
                        {
                            "vulnerability": "VCID-9zzh-5tb2-m7aa"
                        },
                        {
                            "vulnerability": "VCID-aaq7-t35x-t7gc"
                        },
                        {
                            "vulnerability": "VCID-c5x4-1mbq-quch"
                        },
                        {
                            "vulnerability": "VCID-c7wz-4crx-3fgt"
                        },
                        {
                            "vulnerability": "VCID-dpjc-pacw-8bfq"
                        },
                        {
                            "vulnerability": "VCID-dq8r-defv-hbg6"
                        },
                        {
                            "vulnerability": "VCID-f832-cd1v-x3dc"
                        },
                        {
                            "vulnerability": "VCID-hv1g-619g-4yhx"
                        },
                        {
                            "vulnerability": "VCID-hxgq-6b1c-uff9"
                        },
                        {
                            "vulnerability": "VCID-n1gz-v4eb-vqec"
                        },
                        {
                            "vulnerability": "VCID-n537-dmm4-7kas"
                        },
                        {
                            "vulnerability": "VCID-n59e-jkf6-13bf"
                        },
                        {
                            "vulnerability": "VCID-naqw-tuak-xqgc"
                        },
                        {
                            "vulnerability": "VCID-p3vt-v7gj-gqbc"
                        },
                        {
                            "vulnerability": "VCID-rfwn-gj6g-ubbs"
                        },
                        {
                            "vulnerability": "VCID-rmmf-ey8e-eubr"
                        },
                        {
                            "vulnerability": "VCID-tm5u-v65w-8uep"
                        },
                        {
                            "vulnerability": "VCID-wnxx-8abs-5ucw"
                        },
                        {
                            "vulnerability": "VCID-x7bw-5cam-kubb"
                        },
                        {
                            "vulnerability": "VCID-xbam-fvfs-fydw"
                        },
                        {
                            "vulnerability": "VCID-xfew-wxwz-yka3"
                        },
                        {
                            "vulnerability": "VCID-y28b-ghum-ykek"
                        },
                        {
                            "vulnerability": "VCID-y5aq-zmbx-suft"
                        },
                        {
                            "vulnerability": "VCID-zasa-vpjy-nyhm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.14-1"
                }
            ],
            "aliases": [
                "CVE-2026-31593"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-656s-tkaz-m7bj"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/354596?format=api",
            "vulnerability_id": "VCID-6vtw-v3u5-buce",
            "summary": "",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31677.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31677.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31677",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02107",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02083",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04644",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0462",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00023",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06447",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31677"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31677",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31677"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2461763",
                    "reference_id": "2461763",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2461763"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994366?format=api",
                    "purl": "pkg:deb/debian/linux@6.1.4-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.1.4-1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994368?format=api",
                    "purl": "pkg:deb/debian/linux@6.1.162-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.1.162-1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994375?format=api",
                    "purl": "pkg:deb/debian/linux@6.12.74-2~bpo12%2B1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.12.74-2~bpo12%252B1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1089478?format=api",
                    "purl": "pkg:deb/debian/linux@6.19.14-1~bpo13%2B1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.14-1~bpo13%252B1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1077786?format=api",
                    "purl": "pkg:deb/debian/linux@6.19.14-1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1apd-wwuv-cbem"
                        },
                        {
                            "vulnerability": "VCID-23s6-fs1s-4kfb"
                        },
                        {
                            "vulnerability": "VCID-359m-ajks-23ef"
                        },
                        {
                            "vulnerability": "VCID-3apf-j1g4-vfbr"
                        },
                        {
                            "vulnerability": "VCID-43df-n4rn-nua1"
                        },
                        {
                            "vulnerability": "VCID-49sp-s742-dbe6"
                        },
                        {
                            "vulnerability": "VCID-4a7s-trcw-nube"
                        },
                        {
                            "vulnerability": "VCID-5t5f-4e1q-23bd"
                        },
                        {
                            "vulnerability": "VCID-7m8f-1q1y-6uap"
                        },
                        {
                            "vulnerability": "VCID-9x33-33np-c7bv"
                        },
                        {
                            "vulnerability": "VCID-9zzh-5tb2-m7aa"
                        },
                        {
                            "vulnerability": "VCID-aaq7-t35x-t7gc"
                        },
                        {
                            "vulnerability": "VCID-c5x4-1mbq-quch"
                        },
                        {
                            "vulnerability": "VCID-c7wz-4crx-3fgt"
                        },
                        {
                            "vulnerability": "VCID-dpjc-pacw-8bfq"
                        },
                        {
                            "vulnerability": "VCID-dq8r-defv-hbg6"
                        },
                        {
                            "vulnerability": "VCID-f832-cd1v-x3dc"
                        },
                        {
                            "vulnerability": "VCID-hv1g-619g-4yhx"
                        },
                        {
                            "vulnerability": "VCID-hxgq-6b1c-uff9"
                        },
                        {
                            "vulnerability": "VCID-n1gz-v4eb-vqec"
                        },
                        {
                            "vulnerability": "VCID-n537-dmm4-7kas"
                        },
                        {
                            "vulnerability": "VCID-n59e-jkf6-13bf"
                        },
                        {
                            "vulnerability": "VCID-naqw-tuak-xqgc"
                        },
                        {
                            "vulnerability": "VCID-p3vt-v7gj-gqbc"
                        },
                        {
                            "vulnerability": "VCID-rfwn-gj6g-ubbs"
                        },
                        {
                            "vulnerability": "VCID-rmmf-ey8e-eubr"
                        },
                        {
                            "vulnerability": "VCID-tm5u-v65w-8uep"
                        },
                        {
                            "vulnerability": "VCID-wnxx-8abs-5ucw"
                        },
                        {
                            "vulnerability": "VCID-x7bw-5cam-kubb"
                        },
                        {
                            "vulnerability": "VCID-xbam-fvfs-fydw"
                        },
                        {
                            "vulnerability": "VCID-xfew-wxwz-yka3"
                        },
                        {
                            "vulnerability": "VCID-y28b-ghum-ykek"
                        },
                        {
                            "vulnerability": "VCID-y5aq-zmbx-suft"
                        },
                        {
                            "vulnerability": "VCID-zasa-vpjy-nyhm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.14-1"
                }
            ],
            "aliases": [
                "CVE-2026-31677"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6vtw-v3u5-buce"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/354535?format=api",
            "vulnerability_id": "VCID-878n-d9ss-rugc",
            "summary": "In the Linux kernel, the following vulnerability has been resolved:  usb: gadget: f_phonet: fix skb frags[] overflow in pn_rx_complete()  A broken/bored/mean USB host can overflow the skb_shared_info->frags[] array on a Linux gadget exposing a Phonet function by sending an unbounded sequence of full-page OUT transfers.  pn_rx_complete() finalizes the skb only when req->actual < req->length, where req->length is set to PAGE_SIZE by the gadget.  If the host always sends exactly PAGE_SIZE bytes per transfer, fp->rx.skb will never be reset and each completion will add another fragment via skb_add_rx_frag().  Once nr_frags exceeds MAX_SKB_FRAGS (default 17), subsequent frag stores overwrite memory adjacent to the shinfo on the heap.  Drop the skb and account a length error when the frag limit is reached, matching the fix applied in t7xx by commit f0813bcd2d9d (\"net: wwan: t7xx: fix potential skb->frags overflow in RX path\").",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31616.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31616.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31616",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01728",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02278",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02282",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02318",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0462",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31616"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31616",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31616"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2461529",
                    "reference_id": "2461529",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2461529"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994366?format=api",
                    "purl": "pkg:deb/debian/linux@6.1.4-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.1.4-1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994368?format=api",
                    "purl": "pkg:deb/debian/linux@6.1.162-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.1.162-1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994375?format=api",
                    "purl": "pkg:deb/debian/linux@6.12.74-2~bpo12%2B1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.12.74-2~bpo12%252B1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1089478?format=api",
                    "purl": "pkg:deb/debian/linux@6.19.14-1~bpo13%2B1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.14-1~bpo13%252B1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1077786?format=api",
                    "purl": "pkg:deb/debian/linux@6.19.14-1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1apd-wwuv-cbem"
                        },
                        {
                            "vulnerability": "VCID-23s6-fs1s-4kfb"
                        },
                        {
                            "vulnerability": "VCID-359m-ajks-23ef"
                        },
                        {
                            "vulnerability": "VCID-3apf-j1g4-vfbr"
                        },
                        {
                            "vulnerability": "VCID-43df-n4rn-nua1"
                        },
                        {
                            "vulnerability": "VCID-49sp-s742-dbe6"
                        },
                        {
                            "vulnerability": "VCID-4a7s-trcw-nube"
                        },
                        {
                            "vulnerability": "VCID-5t5f-4e1q-23bd"
                        },
                        {
                            "vulnerability": "VCID-7m8f-1q1y-6uap"
                        },
                        {
                            "vulnerability": "VCID-9x33-33np-c7bv"
                        },
                        {
                            "vulnerability": "VCID-9zzh-5tb2-m7aa"
                        },
                        {
                            "vulnerability": "VCID-aaq7-t35x-t7gc"
                        },
                        {
                            "vulnerability": "VCID-c5x4-1mbq-quch"
                        },
                        {
                            "vulnerability": "VCID-c7wz-4crx-3fgt"
                        },
                        {
                            "vulnerability": "VCID-dpjc-pacw-8bfq"
                        },
                        {
                            "vulnerability": "VCID-dq8r-defv-hbg6"
                        },
                        {
                            "vulnerability": "VCID-f832-cd1v-x3dc"
                        },
                        {
                            "vulnerability": "VCID-hv1g-619g-4yhx"
                        },
                        {
                            "vulnerability": "VCID-hxgq-6b1c-uff9"
                        },
                        {
                            "vulnerability": "VCID-n1gz-v4eb-vqec"
                        },
                        {
                            "vulnerability": "VCID-n537-dmm4-7kas"
                        },
                        {
                            "vulnerability": "VCID-n59e-jkf6-13bf"
                        },
                        {
                            "vulnerability": "VCID-naqw-tuak-xqgc"
                        },
                        {
                            "vulnerability": "VCID-p3vt-v7gj-gqbc"
                        },
                        {
                            "vulnerability": "VCID-rfwn-gj6g-ubbs"
                        },
                        {
                            "vulnerability": "VCID-rmmf-ey8e-eubr"
                        },
                        {
                            "vulnerability": "VCID-tm5u-v65w-8uep"
                        },
                        {
                            "vulnerability": "VCID-wnxx-8abs-5ucw"
                        },
                        {
                            "vulnerability": "VCID-x7bw-5cam-kubb"
                        },
                        {
                            "vulnerability": "VCID-xbam-fvfs-fydw"
                        },
                        {
                            "vulnerability": "VCID-xfew-wxwz-yka3"
                        },
                        {
                            "vulnerability": "VCID-y28b-ghum-ykek"
                        },
                        {
                            "vulnerability": "VCID-y5aq-zmbx-suft"
                        },
                        {
                            "vulnerability": "VCID-zasa-vpjy-nyhm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.14-1"
                }
            ],
            "aliases": [
                "CVE-2026-31616"
            ],
            "risk_score": 1.5,
            "exploitability": "0.5",
            "weighted_severity": "3.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-878n-d9ss-rugc"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/354505?format=api",
            "vulnerability_id": "VCID-8v51-tdqe-tbcp",
            "summary": "In the Linux kernel, the following vulnerability has been resolved:  mm: blk-cgroup: fix use-after-free in cgwb_release_workfn()  cgwb_release_workfn() calls css_put(wb->blkcg_css) and then later accesses wb->blkcg_css again via blkcg_unpin_online().  If css_put() drops the last reference, the blkcg can be freed asynchronously (css_free_rwork_fn -> blkcg_css_free -> kfree) before blkcg_unpin_online() dereferences the pointer to access blkcg->online_pin, resulting in a use-after-free:    BUG: KASAN: slab-use-after-free in blkcg_unpin_online (./include/linux/instrumented.h:112 ./include/linux/atomic/atomic-instrumented.h:400 ./include/linux/refcount.h:389 ./include/linux/refcount.h:432 ./include/linux/refcount.h:450 block/blk-cgroup.c:1367)   Write of size 4 at addr ff11000117aa6160 by task kworker/71:1/531    Workqueue: cgwb_release cgwb_release_workfn    Call Trace:     <TASK>      blkcg_unpin_online (./include/linux/instrumented.h:112 ./include/linux/atomic/atomic-instrumented.h:400 ./include/linux/refcount.h:389 ./include/linux/refcount.h:432 ./include/linux/refcount.h:450 block/blk-cgroup.c:1367)      cgwb_release_workfn (mm/backing-dev.c:629)      process_scheduled_works (kernel/workqueue.c:3278 kernel/workqueue.c:3385)     Freed by task 1016:     kfree (./include/linux/kasan.h:235 mm/slub.c:2689 mm/slub.c:6246 mm/slub.c:6561)     css_free_rwork_fn (kernel/cgroup/cgroup.c:5542)     process_scheduled_works (kernel/workqueue.c:3302 kernel/workqueue.c:3385)  ** Stack based on commit 66672af7a095 (\"Add linux-next specific files for 20260410\")  I am seeing this crash sporadically in Meta fleet across multiple kernel versions.  A full reproducer is available at: https://github.com/leitao/debug/blob/main/reproducers/repro_blkcg_uaf.sh  (The race window is narrow.  To make it easily reproducible, inject a msleep(100) between css_put() and blkcg_unpin_online() in cgwb_release_workfn().  With that delay and a KASAN-enabled kernel, the reproducer triggers the splat reliably in less than a second.)  Fix this by moving blkcg_unpin_online() before css_put(), so the cgwb's CSS reference keeps the blkcg alive while blkcg_unpin_online() accesses it.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31586.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31586.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31586",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.018",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02396",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0241",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0245",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0462",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31586"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31586",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31586"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2461465",
                    "reference_id": "2461465",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2461465"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994366?format=api",
                    "purl": "pkg:deb/debian/linux@6.1.4-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.1.4-1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994368?format=api",
                    "purl": "pkg:deb/debian/linux@6.1.162-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.1.162-1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994375?format=api",
                    "purl": "pkg:deb/debian/linux@6.12.74-2~bpo12%2B1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.12.74-2~bpo12%252B1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1089478?format=api",
                    "purl": "pkg:deb/debian/linux@6.19.14-1~bpo13%2B1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.14-1~bpo13%252B1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1077786?format=api",
                    "purl": "pkg:deb/debian/linux@6.19.14-1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1apd-wwuv-cbem"
                        },
                        {
                            "vulnerability": "VCID-23s6-fs1s-4kfb"
                        },
                        {
                            "vulnerability": "VCID-359m-ajks-23ef"
                        },
                        {
                            "vulnerability": "VCID-3apf-j1g4-vfbr"
                        },
                        {
                            "vulnerability": "VCID-43df-n4rn-nua1"
                        },
                        {
                            "vulnerability": "VCID-49sp-s742-dbe6"
                        },
                        {
                            "vulnerability": "VCID-4a7s-trcw-nube"
                        },
                        {
                            "vulnerability": "VCID-5t5f-4e1q-23bd"
                        },
                        {
                            "vulnerability": "VCID-7m8f-1q1y-6uap"
                        },
                        {
                            "vulnerability": "VCID-9x33-33np-c7bv"
                        },
                        {
                            "vulnerability": "VCID-9zzh-5tb2-m7aa"
                        },
                        {
                            "vulnerability": "VCID-aaq7-t35x-t7gc"
                        },
                        {
                            "vulnerability": "VCID-c5x4-1mbq-quch"
                        },
                        {
                            "vulnerability": "VCID-c7wz-4crx-3fgt"
                        },
                        {
                            "vulnerability": "VCID-dpjc-pacw-8bfq"
                        },
                        {
                            "vulnerability": "VCID-dq8r-defv-hbg6"
                        },
                        {
                            "vulnerability": "VCID-f832-cd1v-x3dc"
                        },
                        {
                            "vulnerability": "VCID-hv1g-619g-4yhx"
                        },
                        {
                            "vulnerability": "VCID-hxgq-6b1c-uff9"
                        },
                        {
                            "vulnerability": "VCID-n1gz-v4eb-vqec"
                        },
                        {
                            "vulnerability": "VCID-n537-dmm4-7kas"
                        },
                        {
                            "vulnerability": "VCID-n59e-jkf6-13bf"
                        },
                        {
                            "vulnerability": "VCID-naqw-tuak-xqgc"
                        },
                        {
                            "vulnerability": "VCID-p3vt-v7gj-gqbc"
                        },
                        {
                            "vulnerability": "VCID-rfwn-gj6g-ubbs"
                        },
                        {
                            "vulnerability": "VCID-rmmf-ey8e-eubr"
                        },
                        {
                            "vulnerability": "VCID-tm5u-v65w-8uep"
                        },
                        {
                            "vulnerability": "VCID-wnxx-8abs-5ucw"
                        },
                        {
                            "vulnerability": "VCID-x7bw-5cam-kubb"
                        },
                        {
                            "vulnerability": "VCID-xbam-fvfs-fydw"
                        },
                        {
                            "vulnerability": "VCID-xfew-wxwz-yka3"
                        },
                        {
                            "vulnerability": "VCID-y28b-ghum-ykek"
                        },
                        {
                            "vulnerability": "VCID-y5aq-zmbx-suft"
                        },
                        {
                            "vulnerability": "VCID-zasa-vpjy-nyhm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.14-1"
                }
            ],
            "aliases": [
                "CVE-2026-31586"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8v51-tdqe-tbcp"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/354539?format=api",
            "vulnerability_id": "VCID-9bru-3rtm-sfey",
            "summary": "In the Linux kernel, the following vulnerability has been resolved:  ALSA: usx2y: us144mkii: fix NULL deref on missing interface 0  A malicious USB device with the TASCAM US-144MKII device id can have a configuration containing bInterfaceNumber=1 but no interface 0.  USB configuration descriptors are not required to assign interface numbers sequentially, so usb_ifnum_to_if(dev, 0) returns will NULL, which will then be dereferenced directly.  Fix this up by checking the return value properly.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31620.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "7.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31620.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31620",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0407",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05619",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0762",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07405",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07551",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31620"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31620",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31620"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2461469",
                    "reference_id": "2461469",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2461469"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994366?format=api",
                    "purl": "pkg:deb/debian/linux@6.1.4-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.1.4-1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994368?format=api",
                    "purl": "pkg:deb/debian/linux@6.1.162-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.1.162-1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994375?format=api",
                    "purl": "pkg:deb/debian/linux@6.12.74-2~bpo12%2B1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.12.74-2~bpo12%252B1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1089478?format=api",
                    "purl": "pkg:deb/debian/linux@6.19.14-1~bpo13%2B1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.14-1~bpo13%252B1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1077786?format=api",
                    "purl": "pkg:deb/debian/linux@6.19.14-1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1apd-wwuv-cbem"
                        },
                        {
                            "vulnerability": "VCID-23s6-fs1s-4kfb"
                        },
                        {
                            "vulnerability": "VCID-359m-ajks-23ef"
                        },
                        {
                            "vulnerability": "VCID-3apf-j1g4-vfbr"
                        },
                        {
                            "vulnerability": "VCID-43df-n4rn-nua1"
                        },
                        {
                            "vulnerability": "VCID-49sp-s742-dbe6"
                        },
                        {
                            "vulnerability": "VCID-4a7s-trcw-nube"
                        },
                        {
                            "vulnerability": "VCID-5t5f-4e1q-23bd"
                        },
                        {
                            "vulnerability": "VCID-7m8f-1q1y-6uap"
                        },
                        {
                            "vulnerability": "VCID-9x33-33np-c7bv"
                        },
                        {
                            "vulnerability": "VCID-9zzh-5tb2-m7aa"
                        },
                        {
                            "vulnerability": "VCID-aaq7-t35x-t7gc"
                        },
                        {
                            "vulnerability": "VCID-c5x4-1mbq-quch"
                        },
                        {
                            "vulnerability": "VCID-c7wz-4crx-3fgt"
                        },
                        {
                            "vulnerability": "VCID-dpjc-pacw-8bfq"
                        },
                        {
                            "vulnerability": "VCID-dq8r-defv-hbg6"
                        },
                        {
                            "vulnerability": "VCID-f832-cd1v-x3dc"
                        },
                        {
                            "vulnerability": "VCID-hv1g-619g-4yhx"
                        },
                        {
                            "vulnerability": "VCID-hxgq-6b1c-uff9"
                        },
                        {
                            "vulnerability": "VCID-n1gz-v4eb-vqec"
                        },
                        {
                            "vulnerability": "VCID-n537-dmm4-7kas"
                        },
                        {
                            "vulnerability": "VCID-n59e-jkf6-13bf"
                        },
                        {
                            "vulnerability": "VCID-naqw-tuak-xqgc"
                        },
                        {
                            "vulnerability": "VCID-p3vt-v7gj-gqbc"
                        },
                        {
                            "vulnerability": "VCID-rfwn-gj6g-ubbs"
                        },
                        {
                            "vulnerability": "VCID-rmmf-ey8e-eubr"
                        },
                        {
                            "vulnerability": "VCID-tm5u-v65w-8uep"
                        },
                        {
                            "vulnerability": "VCID-wnxx-8abs-5ucw"
                        },
                        {
                            "vulnerability": "VCID-x7bw-5cam-kubb"
                        },
                        {
                            "vulnerability": "VCID-xbam-fvfs-fydw"
                        },
                        {
                            "vulnerability": "VCID-xfew-wxwz-yka3"
                        },
                        {
                            "vulnerability": "VCID-y28b-ghum-ykek"
                        },
                        {
                            "vulnerability": "VCID-y5aq-zmbx-suft"
                        },
                        {
                            "vulnerability": "VCID-zasa-vpjy-nyhm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.14-1"
                }
            ],
            "aliases": [
                "CVE-2026-31620"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9bru-3rtm-sfey"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/354528?format=api",
            "vulnerability_id": "VCID-9rrq-d3g4-jyfy",
            "summary": "In the Linux kernel, the following vulnerability has been resolved:  smb: client: avoid double-free in smbd_free_send_io() after smbd_send_batch_flush()  smbd_send_batch_flush() already calls smbd_free_send_io(), so we should not call it again after smbd_post_send() moved it to the batch list.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31609.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "7.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31609.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31609",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0407",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00044",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13236",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00057",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1787",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00057",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17675",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00057",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17769",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31609"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31609",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31609"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2461442",
                    "reference_id": "2461442",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2461442"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994366?format=api",
                    "purl": "pkg:deb/debian/linux@6.1.4-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.1.4-1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994368?format=api",
                    "purl": "pkg:deb/debian/linux@6.1.162-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.1.162-1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994375?format=api",
                    "purl": "pkg:deb/debian/linux@6.12.74-2~bpo12%2B1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.12.74-2~bpo12%252B1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1089478?format=api",
                    "purl": "pkg:deb/debian/linux@6.19.14-1~bpo13%2B1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.14-1~bpo13%252B1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1077786?format=api",
                    "purl": "pkg:deb/debian/linux@6.19.14-1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1apd-wwuv-cbem"
                        },
                        {
                            "vulnerability": "VCID-23s6-fs1s-4kfb"
                        },
                        {
                            "vulnerability": "VCID-359m-ajks-23ef"
                        },
                        {
                            "vulnerability": "VCID-3apf-j1g4-vfbr"
                        },
                        {
                            "vulnerability": "VCID-43df-n4rn-nua1"
                        },
                        {
                            "vulnerability": "VCID-49sp-s742-dbe6"
                        },
                        {
                            "vulnerability": "VCID-4a7s-trcw-nube"
                        },
                        {
                            "vulnerability": "VCID-5t5f-4e1q-23bd"
                        },
                        {
                            "vulnerability": "VCID-7m8f-1q1y-6uap"
                        },
                        {
                            "vulnerability": "VCID-9x33-33np-c7bv"
                        },
                        {
                            "vulnerability": "VCID-9zzh-5tb2-m7aa"
                        },
                        {
                            "vulnerability": "VCID-aaq7-t35x-t7gc"
                        },
                        {
                            "vulnerability": "VCID-c5x4-1mbq-quch"
                        },
                        {
                            "vulnerability": "VCID-c7wz-4crx-3fgt"
                        },
                        {
                            "vulnerability": "VCID-dpjc-pacw-8bfq"
                        },
                        {
                            "vulnerability": "VCID-dq8r-defv-hbg6"
                        },
                        {
                            "vulnerability": "VCID-f832-cd1v-x3dc"
                        },
                        {
                            "vulnerability": "VCID-hv1g-619g-4yhx"
                        },
                        {
                            "vulnerability": "VCID-hxgq-6b1c-uff9"
                        },
                        {
                            "vulnerability": "VCID-n1gz-v4eb-vqec"
                        },
                        {
                            "vulnerability": "VCID-n537-dmm4-7kas"
                        },
                        {
                            "vulnerability": "VCID-n59e-jkf6-13bf"
                        },
                        {
                            "vulnerability": "VCID-naqw-tuak-xqgc"
                        },
                        {
                            "vulnerability": "VCID-p3vt-v7gj-gqbc"
                        },
                        {
                            "vulnerability": "VCID-rfwn-gj6g-ubbs"
                        },
                        {
                            "vulnerability": "VCID-rmmf-ey8e-eubr"
                        },
                        {
                            "vulnerability": "VCID-tm5u-v65w-8uep"
                        },
                        {
                            "vulnerability": "VCID-wnxx-8abs-5ucw"
                        },
                        {
                            "vulnerability": "VCID-x7bw-5cam-kubb"
                        },
                        {
                            "vulnerability": "VCID-xbam-fvfs-fydw"
                        },
                        {
                            "vulnerability": "VCID-xfew-wxwz-yka3"
                        },
                        {
                            "vulnerability": "VCID-y28b-ghum-ykek"
                        },
                        {
                            "vulnerability": "VCID-y5aq-zmbx-suft"
                        },
                        {
                            "vulnerability": "VCID-zasa-vpjy-nyhm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.14-1"
                }
            ],
            "aliases": [
                "CVE-2026-31609"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9rrq-d3g4-jyfy"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/354525?format=api",
            "vulnerability_id": "VCID-9wsp-xbm7-yfb9",
            "summary": "In the Linux kernel, the following vulnerability has been resolved:  usb: gadget: f_hid: don't call cdev_init while cdev in use  When calling unbind, then bind again, cdev_init reinitialized the cdev, even though there may still be references to it. That's the case when the /dev/hidg* device is still opened. This obviously unsafe behavior like oopes.  This fixes this by using cdev_alloc to put the cdev on the heap. That way, we can simply allocate a new one in hidg_bind.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31606.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31606.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31606",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02197",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02202",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02232",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0462",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04832",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31606"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31606",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31606"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2461524",
                    "reference_id": "2461524",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2461524"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994366?format=api",
                    "purl": "pkg:deb/debian/linux@6.1.4-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.1.4-1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994368?format=api",
                    "purl": "pkg:deb/debian/linux@6.1.162-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.1.162-1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994375?format=api",
                    "purl": "pkg:deb/debian/linux@6.12.74-2~bpo12%2B1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.12.74-2~bpo12%252B1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1089478?format=api",
                    "purl": "pkg:deb/debian/linux@6.19.14-1~bpo13%2B1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.14-1~bpo13%252B1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1077786?format=api",
                    "purl": "pkg:deb/debian/linux@6.19.14-1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1apd-wwuv-cbem"
                        },
                        {
                            "vulnerability": "VCID-23s6-fs1s-4kfb"
                        },
                        {
                            "vulnerability": "VCID-359m-ajks-23ef"
                        },
                        {
                            "vulnerability": "VCID-3apf-j1g4-vfbr"
                        },
                        {
                            "vulnerability": "VCID-43df-n4rn-nua1"
                        },
                        {
                            "vulnerability": "VCID-49sp-s742-dbe6"
                        },
                        {
                            "vulnerability": "VCID-4a7s-trcw-nube"
                        },
                        {
                            "vulnerability": "VCID-5t5f-4e1q-23bd"
                        },
                        {
                            "vulnerability": "VCID-7m8f-1q1y-6uap"
                        },
                        {
                            "vulnerability": "VCID-9x33-33np-c7bv"
                        },
                        {
                            "vulnerability": "VCID-9zzh-5tb2-m7aa"
                        },
                        {
                            "vulnerability": "VCID-aaq7-t35x-t7gc"
                        },
                        {
                            "vulnerability": "VCID-c5x4-1mbq-quch"
                        },
                        {
                            "vulnerability": "VCID-c7wz-4crx-3fgt"
                        },
                        {
                            "vulnerability": "VCID-dpjc-pacw-8bfq"
                        },
                        {
                            "vulnerability": "VCID-dq8r-defv-hbg6"
                        },
                        {
                            "vulnerability": "VCID-f832-cd1v-x3dc"
                        },
                        {
                            "vulnerability": "VCID-hv1g-619g-4yhx"
                        },
                        {
                            "vulnerability": "VCID-hxgq-6b1c-uff9"
                        },
                        {
                            "vulnerability": "VCID-n1gz-v4eb-vqec"
                        },
                        {
                            "vulnerability": "VCID-n537-dmm4-7kas"
                        },
                        {
                            "vulnerability": "VCID-n59e-jkf6-13bf"
                        },
                        {
                            "vulnerability": "VCID-naqw-tuak-xqgc"
                        },
                        {
                            "vulnerability": "VCID-p3vt-v7gj-gqbc"
                        },
                        {
                            "vulnerability": "VCID-rfwn-gj6g-ubbs"
                        },
                        {
                            "vulnerability": "VCID-rmmf-ey8e-eubr"
                        },
                        {
                            "vulnerability": "VCID-tm5u-v65w-8uep"
                        },
                        {
                            "vulnerability": "VCID-wnxx-8abs-5ucw"
                        },
                        {
                            "vulnerability": "VCID-x7bw-5cam-kubb"
                        },
                        {
                            "vulnerability": "VCID-xbam-fvfs-fydw"
                        },
                        {
                            "vulnerability": "VCID-xfew-wxwz-yka3"
                        },
                        {
                            "vulnerability": "VCID-y28b-ghum-ykek"
                        },
                        {
                            "vulnerability": "VCID-y5aq-zmbx-suft"
                        },
                        {
                            "vulnerability": "VCID-zasa-vpjy-nyhm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.14-1"
                }
            ],
            "aliases": [
                "CVE-2026-31606"
            ],
            "risk_score": 1.5,
            "exploitability": "0.5",
            "weighted_severity": "3.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9wsp-xbm7-yfb9"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/354603?format=api",
            "vulnerability_id": "VCID-a454-61sh-j7ay",
            "summary": "",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31684.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "7.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31684.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31684",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02202",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02232",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04832",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0462",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06543",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31684"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31684",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31684"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L"
                        },
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2461757",
                    "reference_id": "2461757",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2461757"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994366?format=api",
                    "purl": "pkg:deb/debian/linux@6.1.4-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.1.4-1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994368?format=api",
                    "purl": "pkg:deb/debian/linux@6.1.162-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.1.162-1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994375?format=api",
                    "purl": "pkg:deb/debian/linux@6.12.74-2~bpo12%2B1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.12.74-2~bpo12%252B1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1089478?format=api",
                    "purl": "pkg:deb/debian/linux@6.19.14-1~bpo13%2B1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.14-1~bpo13%252B1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1077786?format=api",
                    "purl": "pkg:deb/debian/linux@6.19.14-1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1apd-wwuv-cbem"
                        },
                        {
                            "vulnerability": "VCID-23s6-fs1s-4kfb"
                        },
                        {
                            "vulnerability": "VCID-359m-ajks-23ef"
                        },
                        {
                            "vulnerability": "VCID-3apf-j1g4-vfbr"
                        },
                        {
                            "vulnerability": "VCID-43df-n4rn-nua1"
                        },
                        {
                            "vulnerability": "VCID-49sp-s742-dbe6"
                        },
                        {
                            "vulnerability": "VCID-4a7s-trcw-nube"
                        },
                        {
                            "vulnerability": "VCID-5t5f-4e1q-23bd"
                        },
                        {
                            "vulnerability": "VCID-7m8f-1q1y-6uap"
                        },
                        {
                            "vulnerability": "VCID-9x33-33np-c7bv"
                        },
                        {
                            "vulnerability": "VCID-9zzh-5tb2-m7aa"
                        },
                        {
                            "vulnerability": "VCID-aaq7-t35x-t7gc"
                        },
                        {
                            "vulnerability": "VCID-c5x4-1mbq-quch"
                        },
                        {
                            "vulnerability": "VCID-c7wz-4crx-3fgt"
                        },
                        {
                            "vulnerability": "VCID-dpjc-pacw-8bfq"
                        },
                        {
                            "vulnerability": "VCID-dq8r-defv-hbg6"
                        },
                        {
                            "vulnerability": "VCID-f832-cd1v-x3dc"
                        },
                        {
                            "vulnerability": "VCID-hv1g-619g-4yhx"
                        },
                        {
                            "vulnerability": "VCID-hxgq-6b1c-uff9"
                        },
                        {
                            "vulnerability": "VCID-n1gz-v4eb-vqec"
                        },
                        {
                            "vulnerability": "VCID-n537-dmm4-7kas"
                        },
                        {
                            "vulnerability": "VCID-n59e-jkf6-13bf"
                        },
                        {
                            "vulnerability": "VCID-naqw-tuak-xqgc"
                        },
                        {
                            "vulnerability": "VCID-p3vt-v7gj-gqbc"
                        },
                        {
                            "vulnerability": "VCID-rfwn-gj6g-ubbs"
                        },
                        {
                            "vulnerability": "VCID-rmmf-ey8e-eubr"
                        },
                        {
                            "vulnerability": "VCID-tm5u-v65w-8uep"
                        },
                        {
                            "vulnerability": "VCID-wnxx-8abs-5ucw"
                        },
                        {
                            "vulnerability": "VCID-x7bw-5cam-kubb"
                        },
                        {
                            "vulnerability": "VCID-xbam-fvfs-fydw"
                        },
                        {
                            "vulnerability": "VCID-xfew-wxwz-yka3"
                        },
                        {
                            "vulnerability": "VCID-y28b-ghum-ykek"
                        },
                        {
                            "vulnerability": "VCID-y5aq-zmbx-suft"
                        },
                        {
                            "vulnerability": "VCID-zasa-vpjy-nyhm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.14-1"
                }
            ],
            "aliases": [
                "CVE-2026-31684"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-a454-61sh-j7ay"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/354508?format=api",
            "vulnerability_id": "VCID-cc41-mkuk-2fgu",
            "summary": "In the Linux kernel, the following vulnerability has been resolved:  mm: call ->free_folio() directly in folio_unmap_invalidate()  We can only call filemap_free_folio() if we have a reference to (or hold a lock on) the mapping.  Otherwise, we've already removed the folio from the mapping so it no longer pins the mapping and the mapping can be removed, causing a use-after-free when accessing mapping->a_ops.  Follow the same pattern as __remove_mapping() and load the free_folio function pointer before dropping the lock on the mapping.  That lets us make filemap_free_folio() static as this was the only caller outside filemap.c.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31589.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.6",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31589.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31589",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04986",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.0004",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12133",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00053",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16334",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00057",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17769",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00057",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1787",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31589"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31589",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31589"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2461515",
                    "reference_id": "2461515",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2461515"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994366?format=api",
                    "purl": "pkg:deb/debian/linux@6.1.4-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.1.4-1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994368?format=api",
                    "purl": "pkg:deb/debian/linux@6.1.162-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.1.162-1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994375?format=api",
                    "purl": "pkg:deb/debian/linux@6.12.74-2~bpo12%2B1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.12.74-2~bpo12%252B1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1089478?format=api",
                    "purl": "pkg:deb/debian/linux@6.19.14-1~bpo13%2B1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.14-1~bpo13%252B1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1077786?format=api",
                    "purl": "pkg:deb/debian/linux@6.19.14-1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1apd-wwuv-cbem"
                        },
                        {
                            "vulnerability": "VCID-23s6-fs1s-4kfb"
                        },
                        {
                            "vulnerability": "VCID-359m-ajks-23ef"
                        },
                        {
                            "vulnerability": "VCID-3apf-j1g4-vfbr"
                        },
                        {
                            "vulnerability": "VCID-43df-n4rn-nua1"
                        },
                        {
                            "vulnerability": "VCID-49sp-s742-dbe6"
                        },
                        {
                            "vulnerability": "VCID-4a7s-trcw-nube"
                        },
                        {
                            "vulnerability": "VCID-5t5f-4e1q-23bd"
                        },
                        {
                            "vulnerability": "VCID-7m8f-1q1y-6uap"
                        },
                        {
                            "vulnerability": "VCID-9x33-33np-c7bv"
                        },
                        {
                            "vulnerability": "VCID-9zzh-5tb2-m7aa"
                        },
                        {
                            "vulnerability": "VCID-aaq7-t35x-t7gc"
                        },
                        {
                            "vulnerability": "VCID-c5x4-1mbq-quch"
                        },
                        {
                            "vulnerability": "VCID-c7wz-4crx-3fgt"
                        },
                        {
                            "vulnerability": "VCID-dpjc-pacw-8bfq"
                        },
                        {
                            "vulnerability": "VCID-dq8r-defv-hbg6"
                        },
                        {
                            "vulnerability": "VCID-f832-cd1v-x3dc"
                        },
                        {
                            "vulnerability": "VCID-hv1g-619g-4yhx"
                        },
                        {
                            "vulnerability": "VCID-hxgq-6b1c-uff9"
                        },
                        {
                            "vulnerability": "VCID-n1gz-v4eb-vqec"
                        },
                        {
                            "vulnerability": "VCID-n537-dmm4-7kas"
                        },
                        {
                            "vulnerability": "VCID-n59e-jkf6-13bf"
                        },
                        {
                            "vulnerability": "VCID-naqw-tuak-xqgc"
                        },
                        {
                            "vulnerability": "VCID-p3vt-v7gj-gqbc"
                        },
                        {
                            "vulnerability": "VCID-rfwn-gj6g-ubbs"
                        },
                        {
                            "vulnerability": "VCID-rmmf-ey8e-eubr"
                        },
                        {
                            "vulnerability": "VCID-tm5u-v65w-8uep"
                        },
                        {
                            "vulnerability": "VCID-wnxx-8abs-5ucw"
                        },
                        {
                            "vulnerability": "VCID-x7bw-5cam-kubb"
                        },
                        {
                            "vulnerability": "VCID-xbam-fvfs-fydw"
                        },
                        {
                            "vulnerability": "VCID-xfew-wxwz-yka3"
                        },
                        {
                            "vulnerability": "VCID-y28b-ghum-ykek"
                        },
                        {
                            "vulnerability": "VCID-y5aq-zmbx-suft"
                        },
                        {
                            "vulnerability": "VCID-zasa-vpjy-nyhm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.14-1"
                }
            ],
            "aliases": [
                "CVE-2026-31589"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "5.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cc41-mkuk-2fgu"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78028?format=api",
            "vulnerability_id": "VCID-dq8r-defv-hbg6",
            "summary": "kernel: nvme: memory corruption via unprivileged user passthrough",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6238.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6238.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-6238",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03114",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02981",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03092",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03054",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03076",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02996",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02785",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02789",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02809",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0278",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02761",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02757",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02742",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02754",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03063",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03058",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03048",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-6238"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2250834",
                    "reference_id": "2250834",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T17:15:22Z/"
                        }
                    ],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2250834"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6",
                    "reference_id": "cpe:/o:redhat:enterprise_linux:6",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7",
                    "reference_id": "cpe:/o:redhat:enterprise_linux:7",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8",
                    "reference_id": "cpe:/o:redhat:enterprise_linux:8",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9",
                    "reference_id": "cpe:/o:redhat:enterprise_linux:9",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9"
                },
                {
                    "reference_url": "https://access.redhat.com/security/cve/CVE-2023-6238",
                    "reference_id": "CVE-2023-6238",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T17:15:22Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/security/cve/CVE-2023-6238"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994375?format=api",
                    "purl": "pkg:deb/debian/linux@6.12.74-2~bpo12%2B1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.12.74-2~bpo12%252B1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1068081?format=api",
                    "purl": "pkg:deb/debian/linux@6.19.11-1~bpo13%2B1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.11-1~bpo13%252B1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1026106?format=api",
                    "purl": "pkg:deb/debian/linux@6.19.11-1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1g77-qwuy-nkg8"
                        },
                        {
                            "vulnerability": "VCID-1s77-djzb-xffp"
                        },
                        {
                            "vulnerability": "VCID-4jvb-unxd-3qg3"
                        },
                        {
                            "vulnerability": "VCID-5ahq-saw1-suf1"
                        },
                        {
                            "vulnerability": "VCID-94k1-ja9w-2fd2"
                        },
                        {
                            "vulnerability": "VCID-brte-gqy3-r3ax"
                        },
                        {
                            "vulnerability": "VCID-c7xf-x7d5-87gn"
                        },
                        {
                            "vulnerability": "VCID-dq8r-defv-hbg6"
                        },
                        {
                            "vulnerability": "VCID-fvvb-p7r7-zkbk"
                        },
                        {
                            "vulnerability": "VCID-gbkk-anun-a3ce"
                        },
                        {
                            "vulnerability": "VCID-n59e-jkf6-13bf"
                        },
                        {
                            "vulnerability": "VCID-p3vt-v7gj-gqbc"
                        },
                        {
                            "vulnerability": "VCID-p4by-fm53-yybk"
                        },
                        {
                            "vulnerability": "VCID-pmn9-t8by-myhb"
                        },
                        {
                            "vulnerability": "VCID-qsdm-cyzs-aufy"
                        },
                        {
                            "vulnerability": "VCID-texr-5weq-v3dw"
                        },
                        {
                            "vulnerability": "VCID-v813-y477-vkhn"
                        },
                        {
                            "vulnerability": "VCID-vzkt-5648-ukh7"
                        },
                        {
                            "vulnerability": "VCID-yqcj-27j2-tqb8"
                        },
                        {
                            "vulnerability": "VCID-zh73-s87g-vfff"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.11-1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067254?format=api",
                    "purl": "pkg:deb/debian/linux@6.19.12-1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-dq8r-defv-hbg6"
                        },
                        {
                            "vulnerability": "VCID-n59e-jkf6-13bf"
                        },
                        {
                            "vulnerability": "VCID-p3vt-v7gj-gqbc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.12-1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1088969?format=api",
                    "purl": "pkg:deb/debian/linux@6.19.13-1~bpo13%2B1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.13-1~bpo13%252B1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1068119?format=api",
                    "purl": "pkg:deb/debian/linux@6.19.13-1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-11nd-2f5c-ybe1"
                        },
                        {
                            "vulnerability": "VCID-1n41-qg8u-r7d5"
                        },
                        {
                            "vulnerability": "VCID-22zu-qy6y-aub1"
                        },
                        {
                            "vulnerability": "VCID-25at-2je8-2ufj"
                        },
                        {
                            "vulnerability": "VCID-2cky-e16g-yqgf"
                        },
                        {
                            "vulnerability": "VCID-2dp8-mmkf-w7dx"
                        },
                        {
                            "vulnerability": "VCID-31cj-5nhu-4qa9"
                        },
                        {
                            "vulnerability": "VCID-3mhu-519z-pbck"
                        },
                        {
                            "vulnerability": "VCID-3qmn-b1w4-jkg4"
                        },
                        {
                            "vulnerability": "VCID-3r34-452w-skc2"
                        },
                        {
                            "vulnerability": "VCID-46pr-2cfb-mbhn"
                        },
                        {
                            "vulnerability": "VCID-4e1f-qvnx-87fc"
                        },
                        {
                            "vulnerability": "VCID-4v3t-8s2w-rfbg"
                        },
                        {
                            "vulnerability": "VCID-5vkh-dbsm-vbgu"
                        },
                        {
                            "vulnerability": "VCID-656s-tkaz-m7bj"
                        },
                        {
                            "vulnerability": "VCID-6vtw-v3u5-buce"
                        },
                        {
                            "vulnerability": "VCID-878n-d9ss-rugc"
                        },
                        {
                            "vulnerability": "VCID-8v51-tdqe-tbcp"
                        },
                        {
                            "vulnerability": "VCID-9bru-3rtm-sfey"
                        },
                        {
                            "vulnerability": "VCID-9rrq-d3g4-jyfy"
                        },
                        {
                            "vulnerability": "VCID-9wsp-xbm7-yfb9"
                        },
                        {
                            "vulnerability": "VCID-a454-61sh-j7ay"
                        },
                        {
                            "vulnerability": "VCID-cc41-mkuk-2fgu"
                        },
                        {
                            "vulnerability": "VCID-dq8r-defv-hbg6"
                        },
                        {
                            "vulnerability": "VCID-dqu3-2d1w-bked"
                        },
                        {
                            "vulnerability": "VCID-dwp4-mc1w-4bcw"
                        },
                        {
                            "vulnerability": "VCID-emnd-q69n-a3fe"
                        },
                        {
                            "vulnerability": "VCID-euxu-gjpw-8yhs"
                        },
                        {
                            "vulnerability": "VCID-f5xb-v8j6-nye2"
                        },
                        {
                            "vulnerability": "VCID-fhfz-6h5m-hbed"
                        },
                        {
                            "vulnerability": "VCID-g9zj-fsa9-vkca"
                        },
                        {
                            "vulnerability": "VCID-gr5a-eqvx-n3ha"
                        },
                        {
                            "vulnerability": "VCID-hbnp-yx9t-bbfj"
                        },
                        {
                            "vulnerability": "VCID-hhxy-swz4-eqfy"
                        },
                        {
                            "vulnerability": "VCID-jset-t9qq-xfah"
                        },
                        {
                            "vulnerability": "VCID-jyxp-bjx8-kfbd"
                        },
                        {
                            "vulnerability": "VCID-ka1g-skuq-gqcs"
                        },
                        {
                            "vulnerability": "VCID-kvq6-38sd-77h7"
                        },
                        {
                            "vulnerability": "VCID-kw1q-k8cm-j7dj"
                        },
                        {
                            "vulnerability": "VCID-n59e-jkf6-13bf"
                        },
                        {
                            "vulnerability": "VCID-n99v-8wyx-a3cr"
                        },
                        {
                            "vulnerability": "VCID-nw2n-9b59-gbdm"
                        },
                        {
                            "vulnerability": "VCID-p1xn-hbgr-efby"
                        },
                        {
                            "vulnerability": "VCID-p3vt-v7gj-gqbc"
                        },
                        {
                            "vulnerability": "VCID-pest-xjma-sfbn"
                        },
                        {
                            "vulnerability": "VCID-pgrh-f1dv-27dh"
                        },
                        {
                            "vulnerability": "VCID-pj46-9jp7-33ha"
                        },
                        {
                            "vulnerability": "VCID-r4kz-m7m8-c3b2"
                        },
                        {
                            "vulnerability": "VCID-ruxz-24k9-sbcf"
                        },
                        {
                            "vulnerability": "VCID-sqkd-cwbk-tkec"
                        },
                        {
                            "vulnerability": "VCID-szq9-t587-83h2"
                        },
                        {
                            "vulnerability": "VCID-tafy-p8yj-ukdv"
                        },
                        {
                            "vulnerability": "VCID-than-1kz8-yucx"
                        },
                        {
                            "vulnerability": "VCID-tz5h-hd3e-rbbv"
                        },
                        {
                            "vulnerability": "VCID-uvrh-s5dy-puc5"
                        },
                        {
                            "vulnerability": "VCID-uyug-vjrw-87h6"
                        },
                        {
                            "vulnerability": "VCID-uzrt-axb3-qfcs"
                        },
                        {
                            "vulnerability": "VCID-vx8c-nssy-ubaj"
                        },
                        {
                            "vulnerability": "VCID-vzyy-16xe-qkgm"
                        },
                        {
                            "vulnerability": "VCID-w8d1-9zry-wydv"
                        },
                        {
                            "vulnerability": "VCID-wvu1-rfc1-zya9"
                        },
                        {
                            "vulnerability": "VCID-x9wt-jmne-vudk"
                        },
                        {
                            "vulnerability": "VCID-y54q-e569-p7cx"
                        },
                        {
                            "vulnerability": "VCID-yahm-29wh-z3e9"
                        },
                        {
                            "vulnerability": "VCID-yj9c-fda5-57g2"
                        },
                        {
                            "vulnerability": "VCID-zgb6-kq8s-w3dm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.13-1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1089478?format=api",
                    "purl": "pkg:deb/debian/linux@6.19.14-1~bpo13%2B1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.14-1~bpo13%252B1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1077786?format=api",
                    "purl": "pkg:deb/debian/linux@6.19.14-1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1apd-wwuv-cbem"
                        },
                        {
                            "vulnerability": "VCID-23s6-fs1s-4kfb"
                        },
                        {
                            "vulnerability": "VCID-359m-ajks-23ef"
                        },
                        {
                            "vulnerability": "VCID-3apf-j1g4-vfbr"
                        },
                        {
                            "vulnerability": "VCID-43df-n4rn-nua1"
                        },
                        {
                            "vulnerability": "VCID-49sp-s742-dbe6"
                        },
                        {
                            "vulnerability": "VCID-4a7s-trcw-nube"
                        },
                        {
                            "vulnerability": "VCID-5t5f-4e1q-23bd"
                        },
                        {
                            "vulnerability": "VCID-7m8f-1q1y-6uap"
                        },
                        {
                            "vulnerability": "VCID-9x33-33np-c7bv"
                        },
                        {
                            "vulnerability": "VCID-9zzh-5tb2-m7aa"
                        },
                        {
                            "vulnerability": "VCID-aaq7-t35x-t7gc"
                        },
                        {
                            "vulnerability": "VCID-c5x4-1mbq-quch"
                        },
                        {
                            "vulnerability": "VCID-c7wz-4crx-3fgt"
                        },
                        {
                            "vulnerability": "VCID-dpjc-pacw-8bfq"
                        },
                        {
                            "vulnerability": "VCID-dq8r-defv-hbg6"
                        },
                        {
                            "vulnerability": "VCID-f832-cd1v-x3dc"
                        },
                        {
                            "vulnerability": "VCID-hv1g-619g-4yhx"
                        },
                        {
                            "vulnerability": "VCID-hxgq-6b1c-uff9"
                        },
                        {
                            "vulnerability": "VCID-n1gz-v4eb-vqec"
                        },
                        {
                            "vulnerability": "VCID-n537-dmm4-7kas"
                        },
                        {
                            "vulnerability": "VCID-n59e-jkf6-13bf"
                        },
                        {
                            "vulnerability": "VCID-naqw-tuak-xqgc"
                        },
                        {
                            "vulnerability": "VCID-p3vt-v7gj-gqbc"
                        },
                        {
                            "vulnerability": "VCID-rfwn-gj6g-ubbs"
                        },
                        {
                            "vulnerability": "VCID-rmmf-ey8e-eubr"
                        },
                        {
                            "vulnerability": "VCID-tm5u-v65w-8uep"
                        },
                        {
                            "vulnerability": "VCID-wnxx-8abs-5ucw"
                        },
                        {
                            "vulnerability": "VCID-x7bw-5cam-kubb"
                        },
                        {
                            "vulnerability": "VCID-xbam-fvfs-fydw"
                        },
                        {
                            "vulnerability": "VCID-xfew-wxwz-yka3"
                        },
                        {
                            "vulnerability": "VCID-y28b-ghum-ykek"
                        },
                        {
                            "vulnerability": "VCID-y5aq-zmbx-suft"
                        },
                        {
                            "vulnerability": "VCID-zasa-vpjy-nyhm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.14-1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067255?format=api",
                    "purl": "pkg:deb/debian/linux@7.0-1~exp1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@7.0-1~exp1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1089393?format=api",
                    "purl": "pkg:deb/debian/linux@7.0.3-1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-dq8r-defv-hbg6"
                        },
                        {
                            "vulnerability": "VCID-n59e-jkf6-13bf"
                        },
                        {
                            "vulnerability": "VCID-p3vt-v7gj-gqbc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@7.0.3-1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1105438?format=api",
                    "purl": "pkg:deb/debian/linux@7.0.4-1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-dq8r-defv-hbg6"
                        },
                        {
                            "vulnerability": "VCID-n59e-jkf6-13bf"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@7.0.4-1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1105449?format=api",
                    "purl": "pkg:deb/debian/linux@7.1~rc2-1~exp1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@7.1~rc2-1~exp1"
                }
            ],
            "aliases": [
                "CVE-2023-6238"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "6.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dq8r-defv-hbg6"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/354543?format=api",
            "vulnerability_id": "VCID-dqu3-2d1w-bked",
            "summary": "In the Linux kernel, the following vulnerability has been resolved:  HID: core: clamp report_size in s32ton() to avoid undefined shift  s32ton() shifts by n-1 where n is the field's report_size, a value that comes directly from a HID device.  The HID parser bounds report_size only to <= 256, so a broken HID device can supply a report descriptor with a wide field that triggers shift exponents up to 256 on a 32-bit type when an output report is built via hid_output_field() or hid_set_field().  Commit ec61b41918587 (\"HID: core: fix shift-out-of-bounds in hid_report_raw_event\") added the same n > 32 clamp to the function snto32(), but s32ton() was never given the same fix as I guess syzbot hadn't figured out how to fuzz a device the same way.  Fix this up by just clamping the max value of n, just like snto32() does.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31624.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "7.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31624.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31624",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01728",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02318",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02278",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02282",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0462",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31624"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31624",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31624"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2461477",
                    "reference_id": "2461477",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2461477"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994366?format=api",
                    "purl": "pkg:deb/debian/linux@6.1.4-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.1.4-1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994368?format=api",
                    "purl": "pkg:deb/debian/linux@6.1.162-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.1.162-1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994375?format=api",
                    "purl": "pkg:deb/debian/linux@6.12.74-2~bpo12%2B1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.12.74-2~bpo12%252B1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1089478?format=api",
                    "purl": "pkg:deb/debian/linux@6.19.14-1~bpo13%2B1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.14-1~bpo13%252B1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1077786?format=api",
                    "purl": "pkg:deb/debian/linux@6.19.14-1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1apd-wwuv-cbem"
                        },
                        {
                            "vulnerability": "VCID-23s6-fs1s-4kfb"
                        },
                        {
                            "vulnerability": "VCID-359m-ajks-23ef"
                        },
                        {
                            "vulnerability": "VCID-3apf-j1g4-vfbr"
                        },
                        {
                            "vulnerability": "VCID-43df-n4rn-nua1"
                        },
                        {
                            "vulnerability": "VCID-49sp-s742-dbe6"
                        },
                        {
                            "vulnerability": "VCID-4a7s-trcw-nube"
                        },
                        {
                            "vulnerability": "VCID-5t5f-4e1q-23bd"
                        },
                        {
                            "vulnerability": "VCID-7m8f-1q1y-6uap"
                        },
                        {
                            "vulnerability": "VCID-9x33-33np-c7bv"
                        },
                        {
                            "vulnerability": "VCID-9zzh-5tb2-m7aa"
                        },
                        {
                            "vulnerability": "VCID-aaq7-t35x-t7gc"
                        },
                        {
                            "vulnerability": "VCID-c5x4-1mbq-quch"
                        },
                        {
                            "vulnerability": "VCID-c7wz-4crx-3fgt"
                        },
                        {
                            "vulnerability": "VCID-dpjc-pacw-8bfq"
                        },
                        {
                            "vulnerability": "VCID-dq8r-defv-hbg6"
                        },
                        {
                            "vulnerability": "VCID-f832-cd1v-x3dc"
                        },
                        {
                            "vulnerability": "VCID-hv1g-619g-4yhx"
                        },
                        {
                            "vulnerability": "VCID-hxgq-6b1c-uff9"
                        },
                        {
                            "vulnerability": "VCID-n1gz-v4eb-vqec"
                        },
                        {
                            "vulnerability": "VCID-n537-dmm4-7kas"
                        },
                        {
                            "vulnerability": "VCID-n59e-jkf6-13bf"
                        },
                        {
                            "vulnerability": "VCID-naqw-tuak-xqgc"
                        },
                        {
                            "vulnerability": "VCID-p3vt-v7gj-gqbc"
                        },
                        {
                            "vulnerability": "VCID-rfwn-gj6g-ubbs"
                        },
                        {
                            "vulnerability": "VCID-rmmf-ey8e-eubr"
                        },
                        {
                            "vulnerability": "VCID-tm5u-v65w-8uep"
                        },
                        {
                            "vulnerability": "VCID-wnxx-8abs-5ucw"
                        },
                        {
                            "vulnerability": "VCID-x7bw-5cam-kubb"
                        },
                        {
                            "vulnerability": "VCID-xbam-fvfs-fydw"
                        },
                        {
                            "vulnerability": "VCID-xfew-wxwz-yka3"
                        },
                        {
                            "vulnerability": "VCID-y28b-ghum-ykek"
                        },
                        {
                            "vulnerability": "VCID-y5aq-zmbx-suft"
                        },
                        {
                            "vulnerability": "VCID-zasa-vpjy-nyhm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.14-1"
                }
            ],
            "aliases": [
                "CVE-2026-31624"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dqu3-2d1w-bked"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/354530?format=api",
            "vulnerability_id": "VCID-dwp4-mc1w-4bcw",
            "summary": "In the Linux kernel, the following vulnerability has been resolved:  ksmbd: require 3 sub-authorities before reading sub_auth[2]  parse_dacl() compares each ACE SID against sid_unix_NFS_mode and on match reads sid.sub_auth[2] as the file mode.  If sid_unix_NFS_mode is the prefix S-1-5-88-3 with num_subauth = 2 then compare_sids() compares only min(num_subauth, 2) sub-authorities so a client SID with num_subauth = 2 and sub_auth = {88, 3} will match.  If num_subauth = 2 and the ACE is placed at the very end of the security descriptor, sub_auth[2] will be  4 bytes past end_of_acl.  The out-of-band bytes will then be masked to the low 9 bits and applied as the file's POSIX mode, probably not something that is good to have happen.  Fix this up by forcing the SID to actually carry a third sub-authority before reading it at all.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31611.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31611.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31611",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0462",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00053",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1641",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.0007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21044",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.0007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21111",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.0007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21198",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31611"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2461574",
                    "reference_id": "2461574",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2461574"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994368?format=api",
                    "purl": "pkg:deb/debian/linux@6.1.162-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.1.162-1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994375?format=api",
                    "purl": "pkg:deb/debian/linux@6.12.74-2~bpo12%2B1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.12.74-2~bpo12%252B1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1089478?format=api",
                    "purl": "pkg:deb/debian/linux@6.19.14-1~bpo13%2B1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.14-1~bpo13%252B1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1077786?format=api",
                    "purl": "pkg:deb/debian/linux@6.19.14-1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1apd-wwuv-cbem"
                        },
                        {
                            "vulnerability": "VCID-23s6-fs1s-4kfb"
                        },
                        {
                            "vulnerability": "VCID-359m-ajks-23ef"
                        },
                        {
                            "vulnerability": "VCID-3apf-j1g4-vfbr"
                        },
                        {
                            "vulnerability": "VCID-43df-n4rn-nua1"
                        },
                        {
                            "vulnerability": "VCID-49sp-s742-dbe6"
                        },
                        {
                            "vulnerability": "VCID-4a7s-trcw-nube"
                        },
                        {
                            "vulnerability": "VCID-5t5f-4e1q-23bd"
                        },
                        {
                            "vulnerability": "VCID-7m8f-1q1y-6uap"
                        },
                        {
                            "vulnerability": "VCID-9x33-33np-c7bv"
                        },
                        {
                            "vulnerability": "VCID-9zzh-5tb2-m7aa"
                        },
                        {
                            "vulnerability": "VCID-aaq7-t35x-t7gc"
                        },
                        {
                            "vulnerability": "VCID-c5x4-1mbq-quch"
                        },
                        {
                            "vulnerability": "VCID-c7wz-4crx-3fgt"
                        },
                        {
                            "vulnerability": "VCID-dpjc-pacw-8bfq"
                        },
                        {
                            "vulnerability": "VCID-dq8r-defv-hbg6"
                        },
                        {
                            "vulnerability": "VCID-f832-cd1v-x3dc"
                        },
                        {
                            "vulnerability": "VCID-hv1g-619g-4yhx"
                        },
                        {
                            "vulnerability": "VCID-hxgq-6b1c-uff9"
                        },
                        {
                            "vulnerability": "VCID-n1gz-v4eb-vqec"
                        },
                        {
                            "vulnerability": "VCID-n537-dmm4-7kas"
                        },
                        {
                            "vulnerability": "VCID-n59e-jkf6-13bf"
                        },
                        {
                            "vulnerability": "VCID-naqw-tuak-xqgc"
                        },
                        {
                            "vulnerability": "VCID-p3vt-v7gj-gqbc"
                        },
                        {
                            "vulnerability": "VCID-rfwn-gj6g-ubbs"
                        },
                        {
                            "vulnerability": "VCID-rmmf-ey8e-eubr"
                        },
                        {
                            "vulnerability": "VCID-tm5u-v65w-8uep"
                        },
                        {
                            "vulnerability": "VCID-wnxx-8abs-5ucw"
                        },
                        {
                            "vulnerability": "VCID-x7bw-5cam-kubb"
                        },
                        {
                            "vulnerability": "VCID-xbam-fvfs-fydw"
                        },
                        {
                            "vulnerability": "VCID-xfew-wxwz-yka3"
                        },
                        {
                            "vulnerability": "VCID-y28b-ghum-ykek"
                        },
                        {
                            "vulnerability": "VCID-y5aq-zmbx-suft"
                        },
                        {
                            "vulnerability": "VCID-zasa-vpjy-nyhm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.14-1"
                }
            ],
            "aliases": [
                "CVE-2026-31611"
            ],
            "risk_score": 1.9,
            "exploitability": "0.5",
            "weighted_severity": "3.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dwp4-mc1w-4bcw"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/354130?format=api",
            "vulnerability_id": "VCID-emnd-q69n-a3fe",
            "summary": "",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31532.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31532.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31532",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0245",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02418",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02396",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0241",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06619",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06635",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31532"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31532",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31532"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2461107",
                    "reference_id": "2461107",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2461107"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:13932",
                    "reference_id": "RHSA-2026:13932",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:13932"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:14339",
                    "reference_id": "RHSA-2026:14339",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:14339"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994366?format=api",
                    "purl": "pkg:deb/debian/linux@6.1.4-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.1.4-1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994368?format=api",
                    "purl": "pkg:deb/debian/linux@6.1.162-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.1.162-1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994375?format=api",
                    "purl": "pkg:deb/debian/linux@6.12.74-2~bpo12%2B1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.12.74-2~bpo12%252B1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1089478?format=api",
                    "purl": "pkg:deb/debian/linux@6.19.14-1~bpo13%2B1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.14-1~bpo13%252B1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1077786?format=api",
                    "purl": "pkg:deb/debian/linux@6.19.14-1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1apd-wwuv-cbem"
                        },
                        {
                            "vulnerability": "VCID-23s6-fs1s-4kfb"
                        },
                        {
                            "vulnerability": "VCID-359m-ajks-23ef"
                        },
                        {
                            "vulnerability": "VCID-3apf-j1g4-vfbr"
                        },
                        {
                            "vulnerability": "VCID-43df-n4rn-nua1"
                        },
                        {
                            "vulnerability": "VCID-49sp-s742-dbe6"
                        },
                        {
                            "vulnerability": "VCID-4a7s-trcw-nube"
                        },
                        {
                            "vulnerability": "VCID-5t5f-4e1q-23bd"
                        },
                        {
                            "vulnerability": "VCID-7m8f-1q1y-6uap"
                        },
                        {
                            "vulnerability": "VCID-9x33-33np-c7bv"
                        },
                        {
                            "vulnerability": "VCID-9zzh-5tb2-m7aa"
                        },
                        {
                            "vulnerability": "VCID-aaq7-t35x-t7gc"
                        },
                        {
                            "vulnerability": "VCID-c5x4-1mbq-quch"
                        },
                        {
                            "vulnerability": "VCID-c7wz-4crx-3fgt"
                        },
                        {
                            "vulnerability": "VCID-dpjc-pacw-8bfq"
                        },
                        {
                            "vulnerability": "VCID-dq8r-defv-hbg6"
                        },
                        {
                            "vulnerability": "VCID-f832-cd1v-x3dc"
                        },
                        {
                            "vulnerability": "VCID-hv1g-619g-4yhx"
                        },
                        {
                            "vulnerability": "VCID-hxgq-6b1c-uff9"
                        },
                        {
                            "vulnerability": "VCID-n1gz-v4eb-vqec"
                        },
                        {
                            "vulnerability": "VCID-n537-dmm4-7kas"
                        },
                        {
                            "vulnerability": "VCID-n59e-jkf6-13bf"
                        },
                        {
                            "vulnerability": "VCID-naqw-tuak-xqgc"
                        },
                        {
                            "vulnerability": "VCID-p3vt-v7gj-gqbc"
                        },
                        {
                            "vulnerability": "VCID-rfwn-gj6g-ubbs"
                        },
                        {
                            "vulnerability": "VCID-rmmf-ey8e-eubr"
                        },
                        {
                            "vulnerability": "VCID-tm5u-v65w-8uep"
                        },
                        {
                            "vulnerability": "VCID-wnxx-8abs-5ucw"
                        },
                        {
                            "vulnerability": "VCID-x7bw-5cam-kubb"
                        },
                        {
                            "vulnerability": "VCID-xbam-fvfs-fydw"
                        },
                        {
                            "vulnerability": "VCID-xfew-wxwz-yka3"
                        },
                        {
                            "vulnerability": "VCID-y28b-ghum-ykek"
                        },
                        {
                            "vulnerability": "VCID-y5aq-zmbx-suft"
                        },
                        {
                            "vulnerability": "VCID-zasa-vpjy-nyhm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.14-1"
                }
            ],
            "aliases": [
                "CVE-2026-31532"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-emnd-q69n-a3fe"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/354501?format=api",
            "vulnerability_id": "VCID-euxu-gjpw-8yhs",
            "summary": "In the Linux kernel, the following vulnerability has been resolved:  hwmon: (powerz) Fix use-after-free on USB disconnect  After powerz_disconnect() frees the URB and releases the mutex, a subsequent powerz_read() call can acquire the mutex and call powerz_read_data(), which dereferences the freed URB pointer.  Fix by:  - Setting priv->urb to NULL in powerz_disconnect() so that    powerz_read_data() can detect the disconnected state.  - Adding a !priv->urb check at the start of powerz_read_data()    to return -ENODEV on a disconnected device.  - Moving usb_set_intfdata() before hwmon registration so the    disconnect handler can always find the priv pointer.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31582.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31582.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31582",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01773",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02353",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02363",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02403",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0462",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31582"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31582",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31582"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2461538",
                    "reference_id": "2461538",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2461538"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994366?format=api",
                    "purl": "pkg:deb/debian/linux@6.1.4-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.1.4-1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994368?format=api",
                    "purl": "pkg:deb/debian/linux@6.1.162-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.1.162-1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994375?format=api",
                    "purl": "pkg:deb/debian/linux@6.12.74-2~bpo12%2B1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.12.74-2~bpo12%252B1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1089478?format=api",
                    "purl": "pkg:deb/debian/linux@6.19.14-1~bpo13%2B1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.14-1~bpo13%252B1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1077786?format=api",
                    "purl": "pkg:deb/debian/linux@6.19.14-1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1apd-wwuv-cbem"
                        },
                        {
                            "vulnerability": "VCID-23s6-fs1s-4kfb"
                        },
                        {
                            "vulnerability": "VCID-359m-ajks-23ef"
                        },
                        {
                            "vulnerability": "VCID-3apf-j1g4-vfbr"
                        },
                        {
                            "vulnerability": "VCID-43df-n4rn-nua1"
                        },
                        {
                            "vulnerability": "VCID-49sp-s742-dbe6"
                        },
                        {
                            "vulnerability": "VCID-4a7s-trcw-nube"
                        },
                        {
                            "vulnerability": "VCID-5t5f-4e1q-23bd"
                        },
                        {
                            "vulnerability": "VCID-7m8f-1q1y-6uap"
                        },
                        {
                            "vulnerability": "VCID-9x33-33np-c7bv"
                        },
                        {
                            "vulnerability": "VCID-9zzh-5tb2-m7aa"
                        },
                        {
                            "vulnerability": "VCID-aaq7-t35x-t7gc"
                        },
                        {
                            "vulnerability": "VCID-c5x4-1mbq-quch"
                        },
                        {
                            "vulnerability": "VCID-c7wz-4crx-3fgt"
                        },
                        {
                            "vulnerability": "VCID-dpjc-pacw-8bfq"
                        },
                        {
                            "vulnerability": "VCID-dq8r-defv-hbg6"
                        },
                        {
                            "vulnerability": "VCID-f832-cd1v-x3dc"
                        },
                        {
                            "vulnerability": "VCID-hv1g-619g-4yhx"
                        },
                        {
                            "vulnerability": "VCID-hxgq-6b1c-uff9"
                        },
                        {
                            "vulnerability": "VCID-n1gz-v4eb-vqec"
                        },
                        {
                            "vulnerability": "VCID-n537-dmm4-7kas"
                        },
                        {
                            "vulnerability": "VCID-n59e-jkf6-13bf"
                        },
                        {
                            "vulnerability": "VCID-naqw-tuak-xqgc"
                        },
                        {
                            "vulnerability": "VCID-p3vt-v7gj-gqbc"
                        },
                        {
                            "vulnerability": "VCID-rfwn-gj6g-ubbs"
                        },
                        {
                            "vulnerability": "VCID-rmmf-ey8e-eubr"
                        },
                        {
                            "vulnerability": "VCID-tm5u-v65w-8uep"
                        },
                        {
                            "vulnerability": "VCID-wnxx-8abs-5ucw"
                        },
                        {
                            "vulnerability": "VCID-x7bw-5cam-kubb"
                        },
                        {
                            "vulnerability": "VCID-xbam-fvfs-fydw"
                        },
                        {
                            "vulnerability": "VCID-xfew-wxwz-yka3"
                        },
                        {
                            "vulnerability": "VCID-y28b-ghum-ykek"
                        },
                        {
                            "vulnerability": "VCID-y5aq-zmbx-suft"
                        },
                        {
                            "vulnerability": "VCID-zasa-vpjy-nyhm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.14-1"
                }
            ],
            "aliases": [
                "CVE-2026-31582"
            ],
            "risk_score": 1.9,
            "exploitability": "0.5",
            "weighted_severity": "3.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-euxu-gjpw-8yhs"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/354526?format=api",
            "vulnerability_id": "VCID-f5xb-v8j6-nye2",
            "summary": "In the Linux kernel, the following vulnerability has been resolved:  usbip: validate number_of_packets in usbip_pack_ret_submit()  When a USB/IP client receives a RET_SUBMIT response, usbip_pack_ret_submit() unconditionally overwrites urb->number_of_packets from the network PDU. This value is subsequently used as the loop bound in usbip_recv_iso() and usbip_pad_iso() to iterate over urb->iso_frame_desc[], a flexible array whose size was fixed at URB allocation time based on the *original* number_of_packets from the CMD_SUBMIT.  A malicious USB/IP server can set number_of_packets in the response to a value larger than what was originally submitted, causing a heap out-of-bounds write when usbip_recv_iso() writes to urb->iso_frame_desc[i] beyond the allocated region.  KASAN confirmed this with kernel 7.0.0-rc5:    BUG: KASAN: slab-out-of-bounds in usbip_recv_iso+0x46a/0x640   Write of size 4 at addr ffff888106351d40 by task vhci_rx/69    The buggy address is located 0 bytes to the right of    allocated 320-byte region [ffff888106351c00, ffff888106351d40)  The server side (stub_rx.c) and gadget side (vudc_rx.c) already validate number_of_packets in the CMD_SUBMIT path since commits c6688ef9f297 (\"usbip: fix stub_rx: harden CMD_SUBMIT path to handle malicious input\") and b78d830f0049 (\"usbip: fix vudc_rx: harden CMD_SUBMIT path to handle malicious input\"). The server side validates against USBIP_MAX_ISO_PACKETS because no URB exists yet at that point. On the client side we have the original URB, so we can use the tighter bound: the response must not exceed the original number_of_packets.  This mirrors the existing validation of actual_length against transfer_buffer_length in usbip_recv_xbuff(), which checks the response value against the original allocation size.  Kelvin Mbogo's series (\"usb: usbip: fix integer overflow in usbip_recv_iso()\", v2) hardens the receive-side functions themselves; this patch complements that work by catching the bad value at its source -- in usbip_pack_ret_submit() before the overwrite -- and using the tighter per-URB allocation bound rather than the global USBIP_MAX_ISO_PACKETS limit.  Fix this by checking rpdu->number_of_packets against urb->number_of_packets in usbip_pack_ret_submit() before the overwrite. On violation, clamp to zero so that usbip_recv_iso() and usbip_pad_iso() safely return early.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31607.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "7.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31607.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31607",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0462",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00055",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16922",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00072",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21728",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00072",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21577",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00072",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21645",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31607"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31607",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31607"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H"
                        },
                        {
                            "value": "9.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2461521",
                    "reference_id": "2461521",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2461521"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994366?format=api",
                    "purl": "pkg:deb/debian/linux@6.1.4-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.1.4-1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994368?format=api",
                    "purl": "pkg:deb/debian/linux@6.1.162-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.1.162-1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994375?format=api",
                    "purl": "pkg:deb/debian/linux@6.12.74-2~bpo12%2B1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.12.74-2~bpo12%252B1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1089478?format=api",
                    "purl": "pkg:deb/debian/linux@6.19.14-1~bpo13%2B1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.14-1~bpo13%252B1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1077786?format=api",
                    "purl": "pkg:deb/debian/linux@6.19.14-1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1apd-wwuv-cbem"
                        },
                        {
                            "vulnerability": "VCID-23s6-fs1s-4kfb"
                        },
                        {
                            "vulnerability": "VCID-359m-ajks-23ef"
                        },
                        {
                            "vulnerability": "VCID-3apf-j1g4-vfbr"
                        },
                        {
                            "vulnerability": "VCID-43df-n4rn-nua1"
                        },
                        {
                            "vulnerability": "VCID-49sp-s742-dbe6"
                        },
                        {
                            "vulnerability": "VCID-4a7s-trcw-nube"
                        },
                        {
                            "vulnerability": "VCID-5t5f-4e1q-23bd"
                        },
                        {
                            "vulnerability": "VCID-7m8f-1q1y-6uap"
                        },
                        {
                            "vulnerability": "VCID-9x33-33np-c7bv"
                        },
                        {
                            "vulnerability": "VCID-9zzh-5tb2-m7aa"
                        },
                        {
                            "vulnerability": "VCID-aaq7-t35x-t7gc"
                        },
                        {
                            "vulnerability": "VCID-c5x4-1mbq-quch"
                        },
                        {
                            "vulnerability": "VCID-c7wz-4crx-3fgt"
                        },
                        {
                            "vulnerability": "VCID-dpjc-pacw-8bfq"
                        },
                        {
                            "vulnerability": "VCID-dq8r-defv-hbg6"
                        },
                        {
                            "vulnerability": "VCID-f832-cd1v-x3dc"
                        },
                        {
                            "vulnerability": "VCID-hv1g-619g-4yhx"
                        },
                        {
                            "vulnerability": "VCID-hxgq-6b1c-uff9"
                        },
                        {
                            "vulnerability": "VCID-n1gz-v4eb-vqec"
                        },
                        {
                            "vulnerability": "VCID-n537-dmm4-7kas"
                        },
                        {
                            "vulnerability": "VCID-n59e-jkf6-13bf"
                        },
                        {
                            "vulnerability": "VCID-naqw-tuak-xqgc"
                        },
                        {
                            "vulnerability": "VCID-p3vt-v7gj-gqbc"
                        },
                        {
                            "vulnerability": "VCID-rfwn-gj6g-ubbs"
                        },
                        {
                            "vulnerability": "VCID-rmmf-ey8e-eubr"
                        },
                        {
                            "vulnerability": "VCID-tm5u-v65w-8uep"
                        },
                        {
                            "vulnerability": "VCID-wnxx-8abs-5ucw"
                        },
                        {
                            "vulnerability": "VCID-x7bw-5cam-kubb"
                        },
                        {
                            "vulnerability": "VCID-xbam-fvfs-fydw"
                        },
                        {
                            "vulnerability": "VCID-xfew-wxwz-yka3"
                        },
                        {
                            "vulnerability": "VCID-y28b-ghum-ykek"
                        },
                        {
                            "vulnerability": "VCID-y5aq-zmbx-suft"
                        },
                        {
                            "vulnerability": "VCID-zasa-vpjy-nyhm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.14-1"
                }
            ],
            "aliases": [
                "CVE-2026-31607"
            ],
            "risk_score": 3.3,
            "exploitability": "0.5",
            "weighted_severity": "6.6",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-f5xb-v8j6-nye2"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/354494?format=api",
            "vulnerability_id": "VCID-fhfz-6h5m-hbed",
            "summary": "In the Linux kernel, the following vulnerability has been resolved:  mm/userfaultfd: fix hugetlb fault mutex hash calculation  In mfill_atomic_hugetlb(), linear_page_index() is used to calculate the page index for hugetlb_fault_mutex_hash().  However, linear_page_index() returns the index in PAGE_SIZE units, while hugetlb_fault_mutex_hash() expects the index in huge page units.  This mismatch means that different addresses within the same huge page can produce different hash values, leading to the use of different mutexes for the same huge page.  This can cause races between faulting threads, which can corrupt the reservation map and trigger the BUG_ON in resv_map_release().  Fix this by introducing hugetlb_linear_page_index(), which returns the page index in huge page granularity, and using it in place of linear_page_index().",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31575.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31575.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31575",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01702",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02197",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02202",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02232",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0407",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31575"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31575",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31575"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2461557",
                    "reference_id": "2461557",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2461557"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994366?format=api",
                    "purl": "pkg:deb/debian/linux@6.1.4-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.1.4-1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994368?format=api",
                    "purl": "pkg:deb/debian/linux@6.1.162-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.1.162-1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994375?format=api",
                    "purl": "pkg:deb/debian/linux@6.12.74-2~bpo12%2B1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.12.74-2~bpo12%252B1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1089478?format=api",
                    "purl": "pkg:deb/debian/linux@6.19.14-1~bpo13%2B1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.14-1~bpo13%252B1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1077786?format=api",
                    "purl": "pkg:deb/debian/linux@6.19.14-1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1apd-wwuv-cbem"
                        },
                        {
                            "vulnerability": "VCID-23s6-fs1s-4kfb"
                        },
                        {
                            "vulnerability": "VCID-359m-ajks-23ef"
                        },
                        {
                            "vulnerability": "VCID-3apf-j1g4-vfbr"
                        },
                        {
                            "vulnerability": "VCID-43df-n4rn-nua1"
                        },
                        {
                            "vulnerability": "VCID-49sp-s742-dbe6"
                        },
                        {
                            "vulnerability": "VCID-4a7s-trcw-nube"
                        },
                        {
                            "vulnerability": "VCID-5t5f-4e1q-23bd"
                        },
                        {
                            "vulnerability": "VCID-7m8f-1q1y-6uap"
                        },
                        {
                            "vulnerability": "VCID-9x33-33np-c7bv"
                        },
                        {
                            "vulnerability": "VCID-9zzh-5tb2-m7aa"
                        },
                        {
                            "vulnerability": "VCID-aaq7-t35x-t7gc"
                        },
                        {
                            "vulnerability": "VCID-c5x4-1mbq-quch"
                        },
                        {
                            "vulnerability": "VCID-c7wz-4crx-3fgt"
                        },
                        {
                            "vulnerability": "VCID-dpjc-pacw-8bfq"
                        },
                        {
                            "vulnerability": "VCID-dq8r-defv-hbg6"
                        },
                        {
                            "vulnerability": "VCID-f832-cd1v-x3dc"
                        },
                        {
                            "vulnerability": "VCID-hv1g-619g-4yhx"
                        },
                        {
                            "vulnerability": "VCID-hxgq-6b1c-uff9"
                        },
                        {
                            "vulnerability": "VCID-n1gz-v4eb-vqec"
                        },
                        {
                            "vulnerability": "VCID-n537-dmm4-7kas"
                        },
                        {
                            "vulnerability": "VCID-n59e-jkf6-13bf"
                        },
                        {
                            "vulnerability": "VCID-naqw-tuak-xqgc"
                        },
                        {
                            "vulnerability": "VCID-p3vt-v7gj-gqbc"
                        },
                        {
                            "vulnerability": "VCID-rfwn-gj6g-ubbs"
                        },
                        {
                            "vulnerability": "VCID-rmmf-ey8e-eubr"
                        },
                        {
                            "vulnerability": "VCID-tm5u-v65w-8uep"
                        },
                        {
                            "vulnerability": "VCID-wnxx-8abs-5ucw"
                        },
                        {
                            "vulnerability": "VCID-x7bw-5cam-kubb"
                        },
                        {
                            "vulnerability": "VCID-xbam-fvfs-fydw"
                        },
                        {
                            "vulnerability": "VCID-xfew-wxwz-yka3"
                        },
                        {
                            "vulnerability": "VCID-y28b-ghum-ykek"
                        },
                        {
                            "vulnerability": "VCID-y5aq-zmbx-suft"
                        },
                        {
                            "vulnerability": "VCID-zasa-vpjy-nyhm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.14-1"
                }
            ],
            "aliases": [
                "CVE-2026-31575"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-fhfz-6h5m-hbed"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/354536?format=api",
            "vulnerability_id": "VCID-g9zj-fsa9-vkca",
            "summary": "In the Linux kernel, the following vulnerability has been resolved:  usb: gadget: f_ncm: validate minimum block_len in ncm_unwrap_ntb()  The block_len read from the host-supplied NTB header is checked against ntb_max but has no lower bound. When block_len is smaller than opts->ndp_size, the bounds check of: \tndp_index > (block_len - opts->ndp_size) will underflow producing a huge unsigned value that ndp_index can never exceed, defeating the check entirely.  The same underflow occurs in the datagram index checks against block_len - opts->dpe_size.  With those checks neutered, a malicious USB host can choose ndp_index and datagram offsets that point past the actual transfer, and the skb_put_data() copies adjacent kernel memory into the network skb.  Fix this by rejecting block lengths that cannot hold at least the NTB header plus one NDP.  This will make block_len - opts->ndp_size and block_len - opts->dpe_size both well-defined.  Commit 8d2b1a1ec9f5 (\"CDC-NCM: avoid overflow in sanity checking\") fixed a related class of issues on the host side of NCM.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31617.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31617.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31617",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01728",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02318",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02278",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02282",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0462",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31617"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31617",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31617"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"
                        },
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2461448",
                    "reference_id": "2461448",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2461448"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994366?format=api",
                    "purl": "pkg:deb/debian/linux@6.1.4-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.1.4-1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994368?format=api",
                    "purl": "pkg:deb/debian/linux@6.1.162-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.1.162-1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994375?format=api",
                    "purl": "pkg:deb/debian/linux@6.12.74-2~bpo12%2B1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.12.74-2~bpo12%252B1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1089478?format=api",
                    "purl": "pkg:deb/debian/linux@6.19.14-1~bpo13%2B1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.14-1~bpo13%252B1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1077786?format=api",
                    "purl": "pkg:deb/debian/linux@6.19.14-1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1apd-wwuv-cbem"
                        },
                        {
                            "vulnerability": "VCID-23s6-fs1s-4kfb"
                        },
                        {
                            "vulnerability": "VCID-359m-ajks-23ef"
                        },
                        {
                            "vulnerability": "VCID-3apf-j1g4-vfbr"
                        },
                        {
                            "vulnerability": "VCID-43df-n4rn-nua1"
                        },
                        {
                            "vulnerability": "VCID-49sp-s742-dbe6"
                        },
                        {
                            "vulnerability": "VCID-4a7s-trcw-nube"
                        },
                        {
                            "vulnerability": "VCID-5t5f-4e1q-23bd"
                        },
                        {
                            "vulnerability": "VCID-7m8f-1q1y-6uap"
                        },
                        {
                            "vulnerability": "VCID-9x33-33np-c7bv"
                        },
                        {
                            "vulnerability": "VCID-9zzh-5tb2-m7aa"
                        },
                        {
                            "vulnerability": "VCID-aaq7-t35x-t7gc"
                        },
                        {
                            "vulnerability": "VCID-c5x4-1mbq-quch"
                        },
                        {
                            "vulnerability": "VCID-c7wz-4crx-3fgt"
                        },
                        {
                            "vulnerability": "VCID-dpjc-pacw-8bfq"
                        },
                        {
                            "vulnerability": "VCID-dq8r-defv-hbg6"
                        },
                        {
                            "vulnerability": "VCID-f832-cd1v-x3dc"
                        },
                        {
                            "vulnerability": "VCID-hv1g-619g-4yhx"
                        },
                        {
                            "vulnerability": "VCID-hxgq-6b1c-uff9"
                        },
                        {
                            "vulnerability": "VCID-n1gz-v4eb-vqec"
                        },
                        {
                            "vulnerability": "VCID-n537-dmm4-7kas"
                        },
                        {
                            "vulnerability": "VCID-n59e-jkf6-13bf"
                        },
                        {
                            "vulnerability": "VCID-naqw-tuak-xqgc"
                        },
                        {
                            "vulnerability": "VCID-p3vt-v7gj-gqbc"
                        },
                        {
                            "vulnerability": "VCID-rfwn-gj6g-ubbs"
                        },
                        {
                            "vulnerability": "VCID-rmmf-ey8e-eubr"
                        },
                        {
                            "vulnerability": "VCID-tm5u-v65w-8uep"
                        },
                        {
                            "vulnerability": "VCID-wnxx-8abs-5ucw"
                        },
                        {
                            "vulnerability": "VCID-x7bw-5cam-kubb"
                        },
                        {
                            "vulnerability": "VCID-xbam-fvfs-fydw"
                        },
                        {
                            "vulnerability": "VCID-xfew-wxwz-yka3"
                        },
                        {
                            "vulnerability": "VCID-y28b-ghum-ykek"
                        },
                        {
                            "vulnerability": "VCID-y5aq-zmbx-suft"
                        },
                        {
                            "vulnerability": "VCID-zasa-vpjy-nyhm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.14-1"
                }
            ],
            "aliases": [
                "CVE-2026-31617"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-g9zj-fsa9-vkca"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/354499?format=api",
            "vulnerability_id": "VCID-gr5a-eqvx-n3ha",
            "summary": "In the Linux kernel, the following vulnerability has been resolved:  bcache: fix cached_dev.sb_bio use-after-free and crash  In our production environment, we have received multiple crash reports regarding libceph, which have caught our attention:  ``` [6888366.280350] Call Trace: [6888366.280452]  blk_update_request+0x14e/0x370 [6888366.280561]  blk_mq_end_request+0x1a/0x130 [6888366.280671]  rbd_img_handle_request+0x1a0/0x1b0 [rbd] [6888366.280792]  rbd_obj_handle_request+0x32/0x40 [rbd] [6888366.280903]  __complete_request+0x22/0x70 [libceph] [6888366.281032]  osd_dispatch+0x15e/0xb40 [libceph] [6888366.281164]  ? inet_recvmsg+0x5b/0xd0 [6888366.281272]  ? ceph_tcp_recvmsg+0x6f/0xa0 [libceph] [6888366.281405]  ceph_con_process_message+0x79/0x140 [libceph] [6888366.281534]  ceph_con_v1_try_read+0x5d7/0xf30 [libceph] [6888366.281661]  ceph_con_workfn+0x329/0x680 [libceph] ```  After analyzing the coredump file, we found that the address of dc->sb_bio has been freed. We know that cached_dev is only freed when it is stopped.  Since sb_bio is a part of struct cached_dev, rather than an alloc every time.  If the device is stopped while writing to the superblock, the released address will be accessed at endio.  This patch hopes to wait for sb_write to complete in cached_dev_free.  It should be noted that we analyzed the cause of the problem, then tell all details to the QWEN and adopted the modifications it made.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31580.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31580.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31580",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.018",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02396",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0241",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0245",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0462",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31580"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31580",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31580"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2461464",
                    "reference_id": "2461464",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2461464"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994366?format=api",
                    "purl": "pkg:deb/debian/linux@6.1.4-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.1.4-1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994368?format=api",
                    "purl": "pkg:deb/debian/linux@6.1.162-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.1.162-1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994375?format=api",
                    "purl": "pkg:deb/debian/linux@6.12.74-2~bpo12%2B1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.12.74-2~bpo12%252B1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1089478?format=api",
                    "purl": "pkg:deb/debian/linux@6.19.14-1~bpo13%2B1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.14-1~bpo13%252B1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1077786?format=api",
                    "purl": "pkg:deb/debian/linux@6.19.14-1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1apd-wwuv-cbem"
                        },
                        {
                            "vulnerability": "VCID-23s6-fs1s-4kfb"
                        },
                        {
                            "vulnerability": "VCID-359m-ajks-23ef"
                        },
                        {
                            "vulnerability": "VCID-3apf-j1g4-vfbr"
                        },
                        {
                            "vulnerability": "VCID-43df-n4rn-nua1"
                        },
                        {
                            "vulnerability": "VCID-49sp-s742-dbe6"
                        },
                        {
                            "vulnerability": "VCID-4a7s-trcw-nube"
                        },
                        {
                            "vulnerability": "VCID-5t5f-4e1q-23bd"
                        },
                        {
                            "vulnerability": "VCID-7m8f-1q1y-6uap"
                        },
                        {
                            "vulnerability": "VCID-9x33-33np-c7bv"
                        },
                        {
                            "vulnerability": "VCID-9zzh-5tb2-m7aa"
                        },
                        {
                            "vulnerability": "VCID-aaq7-t35x-t7gc"
                        },
                        {
                            "vulnerability": "VCID-c5x4-1mbq-quch"
                        },
                        {
                            "vulnerability": "VCID-c7wz-4crx-3fgt"
                        },
                        {
                            "vulnerability": "VCID-dpjc-pacw-8bfq"
                        },
                        {
                            "vulnerability": "VCID-dq8r-defv-hbg6"
                        },
                        {
                            "vulnerability": "VCID-f832-cd1v-x3dc"
                        },
                        {
                            "vulnerability": "VCID-hv1g-619g-4yhx"
                        },
                        {
                            "vulnerability": "VCID-hxgq-6b1c-uff9"
                        },
                        {
                            "vulnerability": "VCID-n1gz-v4eb-vqec"
                        },
                        {
                            "vulnerability": "VCID-n537-dmm4-7kas"
                        },
                        {
                            "vulnerability": "VCID-n59e-jkf6-13bf"
                        },
                        {
                            "vulnerability": "VCID-naqw-tuak-xqgc"
                        },
                        {
                            "vulnerability": "VCID-p3vt-v7gj-gqbc"
                        },
                        {
                            "vulnerability": "VCID-rfwn-gj6g-ubbs"
                        },
                        {
                            "vulnerability": "VCID-rmmf-ey8e-eubr"
                        },
                        {
                            "vulnerability": "VCID-tm5u-v65w-8uep"
                        },
                        {
                            "vulnerability": "VCID-wnxx-8abs-5ucw"
                        },
                        {
                            "vulnerability": "VCID-x7bw-5cam-kubb"
                        },
                        {
                            "vulnerability": "VCID-xbam-fvfs-fydw"
                        },
                        {
                            "vulnerability": "VCID-xfew-wxwz-yka3"
                        },
                        {
                            "vulnerability": "VCID-y28b-ghum-ykek"
                        },
                        {
                            "vulnerability": "VCID-y5aq-zmbx-suft"
                        },
                        {
                            "vulnerability": "VCID-zasa-vpjy-nyhm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.14-1"
                }
            ],
            "aliases": [
                "CVE-2026-31580"
            ],
            "risk_score": 1.9,
            "exploitability": "0.5",
            "weighted_severity": "3.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gr5a-eqvx-n3ha"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/354544?format=api",
            "vulnerability_id": "VCID-hbnp-yx9t-bbfj",
            "summary": "In the Linux kernel, the following vulnerability has been resolved:  HID: alps: fix NULL pointer dereference in alps_raw_event()  Commit ecfa6f34492c (\"HID: Add HID_CLAIMED_INPUT guards in raw_event callbacks missing them\") attempted to fix up the HID drivers that had missed the previous fix that was done in 2ff5baa9b527 (\"HID: appleir: Fix potential NULL dereference at raw event handle\"), but the alps driver was missed.  Fix this up by properly checking in the hid-alps driver that it had been claimed correctly before attempting to process the raw event.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31625.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "7.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31625.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31625",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01728",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02318",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02278",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02282",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0462",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31625"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31625",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31625"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2461470",
                    "reference_id": "2461470",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2461470"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994366?format=api",
                    "purl": "pkg:deb/debian/linux@6.1.4-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.1.4-1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994368?format=api",
                    "purl": "pkg:deb/debian/linux@6.1.162-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.1.162-1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994375?format=api",
                    "purl": "pkg:deb/debian/linux@6.12.74-2~bpo12%2B1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.12.74-2~bpo12%252B1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1089478?format=api",
                    "purl": "pkg:deb/debian/linux@6.19.14-1~bpo13%2B1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.14-1~bpo13%252B1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1077786?format=api",
                    "purl": "pkg:deb/debian/linux@6.19.14-1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1apd-wwuv-cbem"
                        },
                        {
                            "vulnerability": "VCID-23s6-fs1s-4kfb"
                        },
                        {
                            "vulnerability": "VCID-359m-ajks-23ef"
                        },
                        {
                            "vulnerability": "VCID-3apf-j1g4-vfbr"
                        },
                        {
                            "vulnerability": "VCID-43df-n4rn-nua1"
                        },
                        {
                            "vulnerability": "VCID-49sp-s742-dbe6"
                        },
                        {
                            "vulnerability": "VCID-4a7s-trcw-nube"
                        },
                        {
                            "vulnerability": "VCID-5t5f-4e1q-23bd"
                        },
                        {
                            "vulnerability": "VCID-7m8f-1q1y-6uap"
                        },
                        {
                            "vulnerability": "VCID-9x33-33np-c7bv"
                        },
                        {
                            "vulnerability": "VCID-9zzh-5tb2-m7aa"
                        },
                        {
                            "vulnerability": "VCID-aaq7-t35x-t7gc"
                        },
                        {
                            "vulnerability": "VCID-c5x4-1mbq-quch"
                        },
                        {
                            "vulnerability": "VCID-c7wz-4crx-3fgt"
                        },
                        {
                            "vulnerability": "VCID-dpjc-pacw-8bfq"
                        },
                        {
                            "vulnerability": "VCID-dq8r-defv-hbg6"
                        },
                        {
                            "vulnerability": "VCID-f832-cd1v-x3dc"
                        },
                        {
                            "vulnerability": "VCID-hv1g-619g-4yhx"
                        },
                        {
                            "vulnerability": "VCID-hxgq-6b1c-uff9"
                        },
                        {
                            "vulnerability": "VCID-n1gz-v4eb-vqec"
                        },
                        {
                            "vulnerability": "VCID-n537-dmm4-7kas"
                        },
                        {
                            "vulnerability": "VCID-n59e-jkf6-13bf"
                        },
                        {
                            "vulnerability": "VCID-naqw-tuak-xqgc"
                        },
                        {
                            "vulnerability": "VCID-p3vt-v7gj-gqbc"
                        },
                        {
                            "vulnerability": "VCID-rfwn-gj6g-ubbs"
                        },
                        {
                            "vulnerability": "VCID-rmmf-ey8e-eubr"
                        },
                        {
                            "vulnerability": "VCID-tm5u-v65w-8uep"
                        },
                        {
                            "vulnerability": "VCID-wnxx-8abs-5ucw"
                        },
                        {
                            "vulnerability": "VCID-x7bw-5cam-kubb"
                        },
                        {
                            "vulnerability": "VCID-xbam-fvfs-fydw"
                        },
                        {
                            "vulnerability": "VCID-xfew-wxwz-yka3"
                        },
                        {
                            "vulnerability": "VCID-y28b-ghum-ykek"
                        },
                        {
                            "vulnerability": "VCID-y5aq-zmbx-suft"
                        },
                        {
                            "vulnerability": "VCID-zasa-vpjy-nyhm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.14-1"
                }
            ],
            "aliases": [
                "CVE-2026-31625"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hbnp-yx9t-bbfj"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/354513?format=api",
            "vulnerability_id": "VCID-hhxy-swz4-eqfy",
            "summary": "In the Linux kernel, the following vulnerability has been resolved:  PCI: endpoint: pci-epf-vntb: Remove duplicate resource teardown  epf_ntb_epc_destroy() duplicates the teardown that the caller is supposed to perform later. This leads to an oops when .allow_link fails or when .drop_link is performed. The following is an example oops of the former case:    Unable to handle kernel paging request at virtual address dead000000000108   [...]   [dead000000000108] address between user and kernel address ranges   Internal error: Oops: 0000000096000044 [#1]  SMP   [...]   Call trace:    pci_epc_remove_epf+0x78/0xe0 (P)    pci_primary_epc_epf_link+0x88/0xa8    configfs_symlink+0x1f4/0x5a0    vfs_symlink+0x134/0x1d8    do_symlinkat+0x88/0x138    __arm64_sys_symlinkat+0x74/0xe0   [...]  Remove the helper, and drop pci_epc_put(). EPC device refcounting is tied to the configfs EPC group lifetime, and pci_epc_put() in the .drop_link path is sufficient.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31594.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31594.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31594",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02278",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02282",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02318",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0407",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06767",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31594"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31594",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31594"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2461523",
                    "reference_id": "2461523",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2461523"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994366?format=api",
                    "purl": "pkg:deb/debian/linux@6.1.4-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.1.4-1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994368?format=api",
                    "purl": "pkg:deb/debian/linux@6.1.162-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.1.162-1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994375?format=api",
                    "purl": "pkg:deb/debian/linux@6.12.74-2~bpo12%2B1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.12.74-2~bpo12%252B1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1089478?format=api",
                    "purl": "pkg:deb/debian/linux@6.19.14-1~bpo13%2B1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.14-1~bpo13%252B1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1077786?format=api",
                    "purl": "pkg:deb/debian/linux@6.19.14-1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1apd-wwuv-cbem"
                        },
                        {
                            "vulnerability": "VCID-23s6-fs1s-4kfb"
                        },
                        {
                            "vulnerability": "VCID-359m-ajks-23ef"
                        },
                        {
                            "vulnerability": "VCID-3apf-j1g4-vfbr"
                        },
                        {
                            "vulnerability": "VCID-43df-n4rn-nua1"
                        },
                        {
                            "vulnerability": "VCID-49sp-s742-dbe6"
                        },
                        {
                            "vulnerability": "VCID-4a7s-trcw-nube"
                        },
                        {
                            "vulnerability": "VCID-5t5f-4e1q-23bd"
                        },
                        {
                            "vulnerability": "VCID-7m8f-1q1y-6uap"
                        },
                        {
                            "vulnerability": "VCID-9x33-33np-c7bv"
                        },
                        {
                            "vulnerability": "VCID-9zzh-5tb2-m7aa"
                        },
                        {
                            "vulnerability": "VCID-aaq7-t35x-t7gc"
                        },
                        {
                            "vulnerability": "VCID-c5x4-1mbq-quch"
                        },
                        {
                            "vulnerability": "VCID-c7wz-4crx-3fgt"
                        },
                        {
                            "vulnerability": "VCID-dpjc-pacw-8bfq"
                        },
                        {
                            "vulnerability": "VCID-dq8r-defv-hbg6"
                        },
                        {
                            "vulnerability": "VCID-f832-cd1v-x3dc"
                        },
                        {
                            "vulnerability": "VCID-hv1g-619g-4yhx"
                        },
                        {
                            "vulnerability": "VCID-hxgq-6b1c-uff9"
                        },
                        {
                            "vulnerability": "VCID-n1gz-v4eb-vqec"
                        },
                        {
                            "vulnerability": "VCID-n537-dmm4-7kas"
                        },
                        {
                            "vulnerability": "VCID-n59e-jkf6-13bf"
                        },
                        {
                            "vulnerability": "VCID-naqw-tuak-xqgc"
                        },
                        {
                            "vulnerability": "VCID-p3vt-v7gj-gqbc"
                        },
                        {
                            "vulnerability": "VCID-rfwn-gj6g-ubbs"
                        },
                        {
                            "vulnerability": "VCID-rmmf-ey8e-eubr"
                        },
                        {
                            "vulnerability": "VCID-tm5u-v65w-8uep"
                        },
                        {
                            "vulnerability": "VCID-wnxx-8abs-5ucw"
                        },
                        {
                            "vulnerability": "VCID-x7bw-5cam-kubb"
                        },
                        {
                            "vulnerability": "VCID-xbam-fvfs-fydw"
                        },
                        {
                            "vulnerability": "VCID-xfew-wxwz-yka3"
                        },
                        {
                            "vulnerability": "VCID-y28b-ghum-ykek"
                        },
                        {
                            "vulnerability": "VCID-y5aq-zmbx-suft"
                        },
                        {
                            "vulnerability": "VCID-zasa-vpjy-nyhm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.14-1"
                }
            ],
            "aliases": [
                "CVE-2026-31594"
            ],
            "risk_score": 1.4,
            "exploitability": "0.5",
            "weighted_severity": "2.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hhxy-swz4-eqfy"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/354529?format=api",
            "vulnerability_id": "VCID-jset-t9qq-xfah",
            "summary": "In the Linux kernel, the following vulnerability has been resolved:  ksmbd: fix mechToken leak when SPNEGO decode fails after token alloc  The kernel ASN.1 BER decoder calls action callbacks incrementally as it walks the input.  When ksmbd_decode_negTokenInit() reaches the mechToken [2] OCTET STRING element, ksmbd_neg_token_alloc() allocates conn->mechToken immediately via kmemdup_nul().  If a later element in the same blob is malformed, then the decoder will return nonzero after the allocation is already live.  This could happen if mechListMIC [3] overrunse the enclosing SEQUENCE.  decode_negotiation_token() then sets conn->use_spnego = false because both the negTokenInit and negTokenTarg grammars failed.  The cleanup at the bottom of smb2_sess_setup() is gated on use_spnego:  \tif (conn->use_spnego && conn->mechToken) { \t\tkfree(conn->mechToken); \t\tconn->mechToken = NULL; \t}  so the kfree is skipped, causing the mechToken to never be freed.  This codepath is reachable pre-authentication, so untrusted clients can cause slow memory leaks on a server without even being properly authenticated.  Fix this up by not checking check for use_spnego, as it's not required, so the memory will always be properly freed.  At the same time, always free the memory in ksmbd_conn_free() incase some other failure path forgot to free it.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31610.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31610.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31610",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05428",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05473",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05548",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00033",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09681",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00046",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13957",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31610"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2461443",
                    "reference_id": "2461443",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2461443"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994368?format=api",
                    "purl": "pkg:deb/debian/linux@6.1.162-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.1.162-1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994375?format=api",
                    "purl": "pkg:deb/debian/linux@6.12.74-2~bpo12%2B1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.12.74-2~bpo12%252B1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1089478?format=api",
                    "purl": "pkg:deb/debian/linux@6.19.14-1~bpo13%2B1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.14-1~bpo13%252B1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1077786?format=api",
                    "purl": "pkg:deb/debian/linux@6.19.14-1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1apd-wwuv-cbem"
                        },
                        {
                            "vulnerability": "VCID-23s6-fs1s-4kfb"
                        },
                        {
                            "vulnerability": "VCID-359m-ajks-23ef"
                        },
                        {
                            "vulnerability": "VCID-3apf-j1g4-vfbr"
                        },
                        {
                            "vulnerability": "VCID-43df-n4rn-nua1"
                        },
                        {
                            "vulnerability": "VCID-49sp-s742-dbe6"
                        },
                        {
                            "vulnerability": "VCID-4a7s-trcw-nube"
                        },
                        {
                            "vulnerability": "VCID-5t5f-4e1q-23bd"
                        },
                        {
                            "vulnerability": "VCID-7m8f-1q1y-6uap"
                        },
                        {
                            "vulnerability": "VCID-9x33-33np-c7bv"
                        },
                        {
                            "vulnerability": "VCID-9zzh-5tb2-m7aa"
                        },
                        {
                            "vulnerability": "VCID-aaq7-t35x-t7gc"
                        },
                        {
                            "vulnerability": "VCID-c5x4-1mbq-quch"
                        },
                        {
                            "vulnerability": "VCID-c7wz-4crx-3fgt"
                        },
                        {
                            "vulnerability": "VCID-dpjc-pacw-8bfq"
                        },
                        {
                            "vulnerability": "VCID-dq8r-defv-hbg6"
                        },
                        {
                            "vulnerability": "VCID-f832-cd1v-x3dc"
                        },
                        {
                            "vulnerability": "VCID-hv1g-619g-4yhx"
                        },
                        {
                            "vulnerability": "VCID-hxgq-6b1c-uff9"
                        },
                        {
                            "vulnerability": "VCID-n1gz-v4eb-vqec"
                        },
                        {
                            "vulnerability": "VCID-n537-dmm4-7kas"
                        },
                        {
                            "vulnerability": "VCID-n59e-jkf6-13bf"
                        },
                        {
                            "vulnerability": "VCID-naqw-tuak-xqgc"
                        },
                        {
                            "vulnerability": "VCID-p3vt-v7gj-gqbc"
                        },
                        {
                            "vulnerability": "VCID-rfwn-gj6g-ubbs"
                        },
                        {
                            "vulnerability": "VCID-rmmf-ey8e-eubr"
                        },
                        {
                            "vulnerability": "VCID-tm5u-v65w-8uep"
                        },
                        {
                            "vulnerability": "VCID-wnxx-8abs-5ucw"
                        },
                        {
                            "vulnerability": "VCID-x7bw-5cam-kubb"
                        },
                        {
                            "vulnerability": "VCID-xbam-fvfs-fydw"
                        },
                        {
                            "vulnerability": "VCID-xfew-wxwz-yka3"
                        },
                        {
                            "vulnerability": "VCID-y28b-ghum-ykek"
                        },
                        {
                            "vulnerability": "VCID-y5aq-zmbx-suft"
                        },
                        {
                            "vulnerability": "VCID-zasa-vpjy-nyhm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.14-1"
                }
            ],
            "aliases": [
                "CVE-2026-31610"
            ],
            "risk_score": 1.2,
            "exploitability": "0.5",
            "weighted_severity": "2.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jset-t9qq-xfah"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/354519?format=api",
            "vulnerability_id": "VCID-jyxp-bjx8-kfbd",
            "summary": "In the Linux kernel, the following vulnerability has been resolved:  arm64: mm: Handle invalid large leaf mappings correctly  It has been possible for a long time to mark ptes in the linear map as invalid. This is done for secretmem, kfence, realm dma memory un/share, and others, by simply clearing the PTE_VALID bit. But until commit a166563e7ec37 (\"arm64: mm: support large block mapping when rodata=full\") large leaf mappings were never made invalid in this way.  It turns out various parts of the code base are not equipped to handle invalid large leaf mappings (in the way they are currently encoded) and I've observed a kernel panic while booting a realm guest on a BBML2_NOABORT system as a result:  [   15.432706] software IO TLB: Memory encryption is active and system is using DMA bounce buffers [   15.476896] Unable to handle kernel paging request at virtual address ffff000019600000 [   15.513762] Mem abort info: [   15.527245]   ESR = 0x0000000096000046 [   15.548553]   EC = 0x25: DABT (current EL), IL = 32 bits [   15.572146]   SET = 0, FnV = 0 [   15.592141]   EA = 0, S1PTW = 0 [   15.612694]   FSC = 0x06: level 2 translation fault [   15.640644] Data abort info: [   15.661983]   ISV = 0, ISS = 0x00000046, ISS2 = 0x00000000 [   15.694875]   CM = 0, WnR = 1, TnD = 0, TagAccess = 0 [   15.723740]   GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0 [   15.755776] swapper pgtable: 4k pages, 48-bit VAs, pgdp=0000000081f3f000 [   15.800410] [ffff000019600000] pgd=0000000000000000, p4d=180000009ffff403, pud=180000009fffe403, pmd=00e8000199600704 [   15.855046] Internal error: Oops: 0000000096000046 [#1]  SMP [   15.886394] Modules linked in: [   15.900029] CPU: 0 UID: 0 PID: 1 Comm: swapper/0 Not tainted 7.0.0-rc4-dirty #4 PREEMPT [   15.935258] Hardware name: linux,dummy-virt (DT) [   15.955612] pstate: 21400005 (nzCv daif +PAN -UAO -TCO +DIT -SSBS BTYPE=--) [   15.986009] pc : __pi_memcpy_generic+0x128/0x22c [   16.006163] lr : swiotlb_bounce+0xf4/0x158 [   16.024145] sp : ffff80008000b8f0 [   16.038896] x29: ffff80008000b8f0 x28: 0000000000000000 x27: 0000000000000000 [   16.069953] x26: ffffb3976d261ba8 x25: 0000000000000000 x24: ffff000019600000 [   16.100876] x23: 0000000000000001 x22: ffff0000043430d0 x21: 0000000000007ff0 [   16.131946] x20: 0000000084570010 x19: 0000000000000000 x18: ffff00001ffe3fcc [   16.163073] x17: 0000000000000000 x16: 00000000003fffff x15: 646e612065766974 [   16.194131] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000 [   16.225059] x11: 0000000000000000 x10: 0000000000000010 x9 : 0000000000000018 [   16.256113] x8 : 0000000000000018 x7 : 0000000000000000 x6 : 0000000000000000 [   16.287203] x5 : ffff000019607ff0 x4 : ffff000004578000 x3 : ffff000019600000 [   16.318145] x2 : 0000000000007ff0 x1 : ffff000004570010 x0 : ffff000019600000 [   16.349071] Call trace: [   16.360143]  __pi_memcpy_generic+0x128/0x22c (P) [   16.380310]  swiotlb_tbl_map_single+0x154/0x2b4 [   16.400282]  swiotlb_map+0x5c/0x228 [   16.415984]  dma_map_phys+0x244/0x2b8 [   16.432199]  dma_map_page_attrs+0x44/0x58 [   16.449782]  virtqueue_map_page_attrs+0x38/0x44 [   16.469596]  virtqueue_map_single_attrs+0xc0/0x130 [   16.490509]  virtnet_rq_alloc.isra.0+0xa4/0x1fc [   16.510355]  try_fill_recv+0x2a4/0x584 [   16.526989]  virtnet_open+0xd4/0x238 [   16.542775]  __dev_open+0x110/0x24c [   16.558280]  __dev_change_flags+0x194/0x20c [   16.576879]  netif_change_flags+0x24/0x6c [   16.594489]  dev_change_flags+0x48/0x7c [   16.611462]  ip_auto_config+0x258/0x1114 [   16.628727]  do_one_initcall+0x80/0x1c8 [   16.645590]  kernel_init_freeable+0x208/0x2f0 [   16.664917]  kernel_init+0x24/0x1e0 [   16.680295]  ret_from_fork+0x10/0x20 [   16.696369] Code: 927cec03 cb0e0021 8b0e0042 a9411c26 (a900340c) [   16.723106] ---[ end trace 0000000000000000 ]--- [   16.752866] Kernel panic - not syncing: Attempted to kill init! exitcode=0x0000000b [   16.792556] Kernel Offset: 0x3396ea200000 from 0xffff8000800000 ---truncated---",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31600.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31600.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31600",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0001",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01069",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06546",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10618",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10755",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10826",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31600"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31600",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31600"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2461514",
                    "reference_id": "2461514",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2461514"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994366?format=api",
                    "purl": "pkg:deb/debian/linux@6.1.4-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.1.4-1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994368?format=api",
                    "purl": "pkg:deb/debian/linux@6.1.162-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.1.162-1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994375?format=api",
                    "purl": "pkg:deb/debian/linux@6.12.74-2~bpo12%2B1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.12.74-2~bpo12%252B1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1089478?format=api",
                    "purl": "pkg:deb/debian/linux@6.19.14-1~bpo13%2B1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.14-1~bpo13%252B1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1077786?format=api",
                    "purl": "pkg:deb/debian/linux@6.19.14-1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1apd-wwuv-cbem"
                        },
                        {
                            "vulnerability": "VCID-23s6-fs1s-4kfb"
                        },
                        {
                            "vulnerability": "VCID-359m-ajks-23ef"
                        },
                        {
                            "vulnerability": "VCID-3apf-j1g4-vfbr"
                        },
                        {
                            "vulnerability": "VCID-43df-n4rn-nua1"
                        },
                        {
                            "vulnerability": "VCID-49sp-s742-dbe6"
                        },
                        {
                            "vulnerability": "VCID-4a7s-trcw-nube"
                        },
                        {
                            "vulnerability": "VCID-5t5f-4e1q-23bd"
                        },
                        {
                            "vulnerability": "VCID-7m8f-1q1y-6uap"
                        },
                        {
                            "vulnerability": "VCID-9x33-33np-c7bv"
                        },
                        {
                            "vulnerability": "VCID-9zzh-5tb2-m7aa"
                        },
                        {
                            "vulnerability": "VCID-aaq7-t35x-t7gc"
                        },
                        {
                            "vulnerability": "VCID-c5x4-1mbq-quch"
                        },
                        {
                            "vulnerability": "VCID-c7wz-4crx-3fgt"
                        },
                        {
                            "vulnerability": "VCID-dpjc-pacw-8bfq"
                        },
                        {
                            "vulnerability": "VCID-dq8r-defv-hbg6"
                        },
                        {
                            "vulnerability": "VCID-f832-cd1v-x3dc"
                        },
                        {
                            "vulnerability": "VCID-hv1g-619g-4yhx"
                        },
                        {
                            "vulnerability": "VCID-hxgq-6b1c-uff9"
                        },
                        {
                            "vulnerability": "VCID-n1gz-v4eb-vqec"
                        },
                        {
                            "vulnerability": "VCID-n537-dmm4-7kas"
                        },
                        {
                            "vulnerability": "VCID-n59e-jkf6-13bf"
                        },
                        {
                            "vulnerability": "VCID-naqw-tuak-xqgc"
                        },
                        {
                            "vulnerability": "VCID-p3vt-v7gj-gqbc"
                        },
                        {
                            "vulnerability": "VCID-rfwn-gj6g-ubbs"
                        },
                        {
                            "vulnerability": "VCID-rmmf-ey8e-eubr"
                        },
                        {
                            "vulnerability": "VCID-tm5u-v65w-8uep"
                        },
                        {
                            "vulnerability": "VCID-wnxx-8abs-5ucw"
                        },
                        {
                            "vulnerability": "VCID-x7bw-5cam-kubb"
                        },
                        {
                            "vulnerability": "VCID-xbam-fvfs-fydw"
                        },
                        {
                            "vulnerability": "VCID-xfew-wxwz-yka3"
                        },
                        {
                            "vulnerability": "VCID-y28b-ghum-ykek"
                        },
                        {
                            "vulnerability": "VCID-y5aq-zmbx-suft"
                        },
                        {
                            "vulnerability": "VCID-zasa-vpjy-nyhm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.14-1"
                }
            ],
            "aliases": [
                "CVE-2026-31600"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jyxp-bjx8-kfbd"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/354517?format=api",
            "vulnerability_id": "VCID-ka1g-skuq-gqcs",
            "summary": "In the Linux kernel, the following vulnerability has been resolved:  ocfs2: fix possible deadlock between unlink and dio_end_io_write  ocfs2_unlink takes orphan dir inode_lock first and then ip_alloc_sem, while in ocfs2_dio_end_io_write, it acquires these locks in reverse order. This creates an ABBA lock ordering violation on lock classes ocfs2_sysfile_lock_key[ORPHAN_DIR_SYSTEM_INODE] and ocfs2_file_ip_alloc_sem_key.  Lock Chain #0 (orphan dir inode_lock -> ip_alloc_sem): ocfs2_unlink   ocfs2_prepare_orphan_dir     ocfs2_lookup_lock_orphan_dir       inode_lock(orphan_dir_inode) <- lock A     __ocfs2_prepare_orphan_dir       ocfs2_prepare_dir_for_insert         ocfs2_extend_dir \t  ocfs2_expand_inline_dir \t    down_write(&oi->ip_alloc_sem) <- Lock B  Lock Chain #1 (ip_alloc_sem -> orphan dir inode_lock): ocfs2_dio_end_io_write   down_write(&oi->ip_alloc_sem) <- Lock B   ocfs2_del_inode_from_orphan()     inode_lock(orphan_dir_inode) <- Lock A  Deadlock Scenario:   CPU0 (unlink)                     CPU1 (dio_end_io_write)   ------                            ------   inode_lock(orphan_dir_inode)                                     down_write(ip_alloc_sem)   down_write(ip_alloc_sem)                                     inode_lock(orphan_dir_inode)  Since ip_alloc_sem is to protect allocation changes, which is unrelated with operations in ocfs2_del_inode_from_orphan.  So move ocfs2_del_inode_from_orphan out of ip_alloc_sem to fix the deadlock.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31598.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31598.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31598",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0462",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00053",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16423",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19271",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19359",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19447",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31598"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31598",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31598"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2461441",
                    "reference_id": "2461441",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2461441"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994366?format=api",
                    "purl": "pkg:deb/debian/linux@6.1.4-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.1.4-1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994368?format=api",
                    "purl": "pkg:deb/debian/linux@6.1.162-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.1.162-1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994375?format=api",
                    "purl": "pkg:deb/debian/linux@6.12.74-2~bpo12%2B1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.12.74-2~bpo12%252B1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1089478?format=api",
                    "purl": "pkg:deb/debian/linux@6.19.14-1~bpo13%2B1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.14-1~bpo13%252B1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1077786?format=api",
                    "purl": "pkg:deb/debian/linux@6.19.14-1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1apd-wwuv-cbem"
                        },
                        {
                            "vulnerability": "VCID-23s6-fs1s-4kfb"
                        },
                        {
                            "vulnerability": "VCID-359m-ajks-23ef"
                        },
                        {
                            "vulnerability": "VCID-3apf-j1g4-vfbr"
                        },
                        {
                            "vulnerability": "VCID-43df-n4rn-nua1"
                        },
                        {
                            "vulnerability": "VCID-49sp-s742-dbe6"
                        },
                        {
                            "vulnerability": "VCID-4a7s-trcw-nube"
                        },
                        {
                            "vulnerability": "VCID-5t5f-4e1q-23bd"
                        },
                        {
                            "vulnerability": "VCID-7m8f-1q1y-6uap"
                        },
                        {
                            "vulnerability": "VCID-9x33-33np-c7bv"
                        },
                        {
                            "vulnerability": "VCID-9zzh-5tb2-m7aa"
                        },
                        {
                            "vulnerability": "VCID-aaq7-t35x-t7gc"
                        },
                        {
                            "vulnerability": "VCID-c5x4-1mbq-quch"
                        },
                        {
                            "vulnerability": "VCID-c7wz-4crx-3fgt"
                        },
                        {
                            "vulnerability": "VCID-dpjc-pacw-8bfq"
                        },
                        {
                            "vulnerability": "VCID-dq8r-defv-hbg6"
                        },
                        {
                            "vulnerability": "VCID-f832-cd1v-x3dc"
                        },
                        {
                            "vulnerability": "VCID-hv1g-619g-4yhx"
                        },
                        {
                            "vulnerability": "VCID-hxgq-6b1c-uff9"
                        },
                        {
                            "vulnerability": "VCID-n1gz-v4eb-vqec"
                        },
                        {
                            "vulnerability": "VCID-n537-dmm4-7kas"
                        },
                        {
                            "vulnerability": "VCID-n59e-jkf6-13bf"
                        },
                        {
                            "vulnerability": "VCID-naqw-tuak-xqgc"
                        },
                        {
                            "vulnerability": "VCID-p3vt-v7gj-gqbc"
                        },
                        {
                            "vulnerability": "VCID-rfwn-gj6g-ubbs"
                        },
                        {
                            "vulnerability": "VCID-rmmf-ey8e-eubr"
                        },
                        {
                            "vulnerability": "VCID-tm5u-v65w-8uep"
                        },
                        {
                            "vulnerability": "VCID-wnxx-8abs-5ucw"
                        },
                        {
                            "vulnerability": "VCID-x7bw-5cam-kubb"
                        },
                        {
                            "vulnerability": "VCID-xbam-fvfs-fydw"
                        },
                        {
                            "vulnerability": "VCID-xfew-wxwz-yka3"
                        },
                        {
                            "vulnerability": "VCID-y28b-ghum-ykek"
                        },
                        {
                            "vulnerability": "VCID-y5aq-zmbx-suft"
                        },
                        {
                            "vulnerability": "VCID-zasa-vpjy-nyhm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.14-1"
                }
            ],
            "aliases": [
                "CVE-2026-31598"
            ],
            "risk_score": 1.9,
            "exploitability": "0.5",
            "weighted_severity": "3.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ka1g-skuq-gqcs"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/354592?format=api",
            "vulnerability_id": "VCID-kvq6-38sd-77h7",
            "summary": "",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31673.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31673.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31673",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01773",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02353",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02363",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02403",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0462",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31673"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31673",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31673"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2461752",
                    "reference_id": "2461752",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2461752"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994366?format=api",
                    "purl": "pkg:deb/debian/linux@6.1.4-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.1.4-1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994368?format=api",
                    "purl": "pkg:deb/debian/linux@6.1.162-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.1.162-1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994375?format=api",
                    "purl": "pkg:deb/debian/linux@6.12.74-2~bpo12%2B1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.12.74-2~bpo12%252B1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1089478?format=api",
                    "purl": "pkg:deb/debian/linux@6.19.14-1~bpo13%2B1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.14-1~bpo13%252B1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1077786?format=api",
                    "purl": "pkg:deb/debian/linux@6.19.14-1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1apd-wwuv-cbem"
                        },
                        {
                            "vulnerability": "VCID-23s6-fs1s-4kfb"
                        },
                        {
                            "vulnerability": "VCID-359m-ajks-23ef"
                        },
                        {
                            "vulnerability": "VCID-3apf-j1g4-vfbr"
                        },
                        {
                            "vulnerability": "VCID-43df-n4rn-nua1"
                        },
                        {
                            "vulnerability": "VCID-49sp-s742-dbe6"
                        },
                        {
                            "vulnerability": "VCID-4a7s-trcw-nube"
                        },
                        {
                            "vulnerability": "VCID-5t5f-4e1q-23bd"
                        },
                        {
                            "vulnerability": "VCID-7m8f-1q1y-6uap"
                        },
                        {
                            "vulnerability": "VCID-9x33-33np-c7bv"
                        },
                        {
                            "vulnerability": "VCID-9zzh-5tb2-m7aa"
                        },
                        {
                            "vulnerability": "VCID-aaq7-t35x-t7gc"
                        },
                        {
                            "vulnerability": "VCID-c5x4-1mbq-quch"
                        },
                        {
                            "vulnerability": "VCID-c7wz-4crx-3fgt"
                        },
                        {
                            "vulnerability": "VCID-dpjc-pacw-8bfq"
                        },
                        {
                            "vulnerability": "VCID-dq8r-defv-hbg6"
                        },
                        {
                            "vulnerability": "VCID-f832-cd1v-x3dc"
                        },
                        {
                            "vulnerability": "VCID-hv1g-619g-4yhx"
                        },
                        {
                            "vulnerability": "VCID-hxgq-6b1c-uff9"
                        },
                        {
                            "vulnerability": "VCID-n1gz-v4eb-vqec"
                        },
                        {
                            "vulnerability": "VCID-n537-dmm4-7kas"
                        },
                        {
                            "vulnerability": "VCID-n59e-jkf6-13bf"
                        },
                        {
                            "vulnerability": "VCID-naqw-tuak-xqgc"
                        },
                        {
                            "vulnerability": "VCID-p3vt-v7gj-gqbc"
                        },
                        {
                            "vulnerability": "VCID-rfwn-gj6g-ubbs"
                        },
                        {
                            "vulnerability": "VCID-rmmf-ey8e-eubr"
                        },
                        {
                            "vulnerability": "VCID-tm5u-v65w-8uep"
                        },
                        {
                            "vulnerability": "VCID-wnxx-8abs-5ucw"
                        },
                        {
                            "vulnerability": "VCID-x7bw-5cam-kubb"
                        },
                        {
                            "vulnerability": "VCID-xbam-fvfs-fydw"
                        },
                        {
                            "vulnerability": "VCID-xfew-wxwz-yka3"
                        },
                        {
                            "vulnerability": "VCID-y28b-ghum-ykek"
                        },
                        {
                            "vulnerability": "VCID-y5aq-zmbx-suft"
                        },
                        {
                            "vulnerability": "VCID-zasa-vpjy-nyhm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.14-1"
                }
            ],
            "aliases": [
                "CVE-2026-31673"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kvq6-38sd-77h7"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/354515?format=api",
            "vulnerability_id": "VCID-kw1q-k8cm-j7dj",
            "summary": "In the Linux kernel, the following vulnerability has been resolved:  ocfs2: handle invalid dinode in ocfs2_group_extend  [BUG] kernel BUG at fs/ocfs2/resize.c:308! Oops: invalid opcode: 0000 [#1] SMP KASAN NOPTI RIP: 0010:ocfs2_group_extend+0x10aa/0x1ae0 fs/ocfs2/resize.c:308 Code: 8b8520ff ffff83f8 860f8580 030000e8 5cc3c1fe Call Trace:  ...  ocfs2_ioctl+0x175/0x6e0 fs/ocfs2/ioctl.c:869  vfs_ioctl fs/ioctl.c:51 [inline]  __do_sys_ioctl fs/ioctl.c:597 [inline]  __se_sys_ioctl fs/ioctl.c:583 [inline]  __x64_sys_ioctl+0x197/0x1e0 fs/ioctl.c:583  x64_sys_call+0x1144/0x26a0 arch/x86/include/generated/asm/syscalls_64.h:17  do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]  do_syscall_64+0x93/0xf80 arch/x86/entry/syscall_64.c:94  entry_SYSCALL_64_after_hwframe+0x76/0x7e  ...  [CAUSE] ocfs2_group_extend() assumes that the global bitmap inode block returned from ocfs2_inode_lock() has already been validated and BUG_ONs when the signature is not a dinode. That assumption is too strong for crafted filesystems because the JBD2-managed buffer path can bypass structural validation and return an invalid dinode to the resize ioctl.  [FIX] Validate the dinode explicitly in ocfs2_group_extend(). If the global bitmap buffer does not contain a valid dinode, report filesystem corruption with ocfs2_error() and fail the resize operation instead of crashing the kernel.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31596.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31596.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31596",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02278",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02282",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02318",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0462",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06767",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31596"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31596",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31596"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2461550",
                    "reference_id": "2461550",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2461550"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994366?format=api",
                    "purl": "pkg:deb/debian/linux@6.1.4-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.1.4-1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994368?format=api",
                    "purl": "pkg:deb/debian/linux@6.1.162-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.1.162-1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994375?format=api",
                    "purl": "pkg:deb/debian/linux@6.12.74-2~bpo12%2B1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.12.74-2~bpo12%252B1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1089478?format=api",
                    "purl": "pkg:deb/debian/linux@6.19.14-1~bpo13%2B1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.14-1~bpo13%252B1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1077786?format=api",
                    "purl": "pkg:deb/debian/linux@6.19.14-1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1apd-wwuv-cbem"
                        },
                        {
                            "vulnerability": "VCID-23s6-fs1s-4kfb"
                        },
                        {
                            "vulnerability": "VCID-359m-ajks-23ef"
                        },
                        {
                            "vulnerability": "VCID-3apf-j1g4-vfbr"
                        },
                        {
                            "vulnerability": "VCID-43df-n4rn-nua1"
                        },
                        {
                            "vulnerability": "VCID-49sp-s742-dbe6"
                        },
                        {
                            "vulnerability": "VCID-4a7s-trcw-nube"
                        },
                        {
                            "vulnerability": "VCID-5t5f-4e1q-23bd"
                        },
                        {
                            "vulnerability": "VCID-7m8f-1q1y-6uap"
                        },
                        {
                            "vulnerability": "VCID-9x33-33np-c7bv"
                        },
                        {
                            "vulnerability": "VCID-9zzh-5tb2-m7aa"
                        },
                        {
                            "vulnerability": "VCID-aaq7-t35x-t7gc"
                        },
                        {
                            "vulnerability": "VCID-c5x4-1mbq-quch"
                        },
                        {
                            "vulnerability": "VCID-c7wz-4crx-3fgt"
                        },
                        {
                            "vulnerability": "VCID-dpjc-pacw-8bfq"
                        },
                        {
                            "vulnerability": "VCID-dq8r-defv-hbg6"
                        },
                        {
                            "vulnerability": "VCID-f832-cd1v-x3dc"
                        },
                        {
                            "vulnerability": "VCID-hv1g-619g-4yhx"
                        },
                        {
                            "vulnerability": "VCID-hxgq-6b1c-uff9"
                        },
                        {
                            "vulnerability": "VCID-n1gz-v4eb-vqec"
                        },
                        {
                            "vulnerability": "VCID-n537-dmm4-7kas"
                        },
                        {
                            "vulnerability": "VCID-n59e-jkf6-13bf"
                        },
                        {
                            "vulnerability": "VCID-naqw-tuak-xqgc"
                        },
                        {
                            "vulnerability": "VCID-p3vt-v7gj-gqbc"
                        },
                        {
                            "vulnerability": "VCID-rfwn-gj6g-ubbs"
                        },
                        {
                            "vulnerability": "VCID-rmmf-ey8e-eubr"
                        },
                        {
                            "vulnerability": "VCID-tm5u-v65w-8uep"
                        },
                        {
                            "vulnerability": "VCID-wnxx-8abs-5ucw"
                        },
                        {
                            "vulnerability": "VCID-x7bw-5cam-kubb"
                        },
                        {
                            "vulnerability": "VCID-xbam-fvfs-fydw"
                        },
                        {
                            "vulnerability": "VCID-xfew-wxwz-yka3"
                        },
                        {
                            "vulnerability": "VCID-y28b-ghum-ykek"
                        },
                        {
                            "vulnerability": "VCID-y5aq-zmbx-suft"
                        },
                        {
                            "vulnerability": "VCID-zasa-vpjy-nyhm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.14-1"
                }
            ],
            "aliases": [
                "CVE-2026-31596"
            ],
            "risk_score": 1.4,
            "exploitability": "0.5",
            "weighted_severity": "2.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kw1q-k8cm-j7dj"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79006?format=api",
            "vulnerability_id": "VCID-n59e-jkf6-13bf",
            "summary": "kernel: ntfs3 local privledge escalation if NTFS character set and remount and umount called simultaneously",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3238.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3238.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-3238",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0008",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23708",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0008",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23388",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.0008",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23336",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.0008",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23233",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.0008",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23317",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.0008",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23751",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0008",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23531",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0008",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23602",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0008",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23648",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0008",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23664",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0008",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23622",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0008",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23565",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0008",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23577",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0008",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23567",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0008",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23547",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0008",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23364",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.0008",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23353",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-3238"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2127927",
                    "reference_id": "2127927",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-01T13:32:12Z/"
                        }
                    ],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2127927"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994368?format=api",
                    "purl": "pkg:deb/debian/linux@6.1.162-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.1.162-1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994375?format=api",
                    "purl": "pkg:deb/debian/linux@6.12.74-2~bpo12%2B1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.12.74-2~bpo12%252B1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1068081?format=api",
                    "purl": "pkg:deb/debian/linux@6.19.11-1~bpo13%2B1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.11-1~bpo13%252B1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1026106?format=api",
                    "purl": "pkg:deb/debian/linux@6.19.11-1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1g77-qwuy-nkg8"
                        },
                        {
                            "vulnerability": "VCID-1s77-djzb-xffp"
                        },
                        {
                            "vulnerability": "VCID-4jvb-unxd-3qg3"
                        },
                        {
                            "vulnerability": "VCID-5ahq-saw1-suf1"
                        },
                        {
                            "vulnerability": "VCID-94k1-ja9w-2fd2"
                        },
                        {
                            "vulnerability": "VCID-brte-gqy3-r3ax"
                        },
                        {
                            "vulnerability": "VCID-c7xf-x7d5-87gn"
                        },
                        {
                            "vulnerability": "VCID-dq8r-defv-hbg6"
                        },
                        {
                            "vulnerability": "VCID-fvvb-p7r7-zkbk"
                        },
                        {
                            "vulnerability": "VCID-gbkk-anun-a3ce"
                        },
                        {
                            "vulnerability": "VCID-n59e-jkf6-13bf"
                        },
                        {
                            "vulnerability": "VCID-p3vt-v7gj-gqbc"
                        },
                        {
                            "vulnerability": "VCID-p4by-fm53-yybk"
                        },
                        {
                            "vulnerability": "VCID-pmn9-t8by-myhb"
                        },
                        {
                            "vulnerability": "VCID-qsdm-cyzs-aufy"
                        },
                        {
                            "vulnerability": "VCID-texr-5weq-v3dw"
                        },
                        {
                            "vulnerability": "VCID-v813-y477-vkhn"
                        },
                        {
                            "vulnerability": "VCID-vzkt-5648-ukh7"
                        },
                        {
                            "vulnerability": "VCID-yqcj-27j2-tqb8"
                        },
                        {
                            "vulnerability": "VCID-zh73-s87g-vfff"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.11-1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067254?format=api",
                    "purl": "pkg:deb/debian/linux@6.19.12-1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-dq8r-defv-hbg6"
                        },
                        {
                            "vulnerability": "VCID-n59e-jkf6-13bf"
                        },
                        {
                            "vulnerability": "VCID-p3vt-v7gj-gqbc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.12-1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1088969?format=api",
                    "purl": "pkg:deb/debian/linux@6.19.13-1~bpo13%2B1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.13-1~bpo13%252B1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1068119?format=api",
                    "purl": "pkg:deb/debian/linux@6.19.13-1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-11nd-2f5c-ybe1"
                        },
                        {
                            "vulnerability": "VCID-1n41-qg8u-r7d5"
                        },
                        {
                            "vulnerability": "VCID-22zu-qy6y-aub1"
                        },
                        {
                            "vulnerability": "VCID-25at-2je8-2ufj"
                        },
                        {
                            "vulnerability": "VCID-2cky-e16g-yqgf"
                        },
                        {
                            "vulnerability": "VCID-2dp8-mmkf-w7dx"
                        },
                        {
                            "vulnerability": "VCID-31cj-5nhu-4qa9"
                        },
                        {
                            "vulnerability": "VCID-3mhu-519z-pbck"
                        },
                        {
                            "vulnerability": "VCID-3qmn-b1w4-jkg4"
                        },
                        {
                            "vulnerability": "VCID-3r34-452w-skc2"
                        },
                        {
                            "vulnerability": "VCID-46pr-2cfb-mbhn"
                        },
                        {
                            "vulnerability": "VCID-4e1f-qvnx-87fc"
                        },
                        {
                            "vulnerability": "VCID-4v3t-8s2w-rfbg"
                        },
                        {
                            "vulnerability": "VCID-5vkh-dbsm-vbgu"
                        },
                        {
                            "vulnerability": "VCID-656s-tkaz-m7bj"
                        },
                        {
                            "vulnerability": "VCID-6vtw-v3u5-buce"
                        },
                        {
                            "vulnerability": "VCID-878n-d9ss-rugc"
                        },
                        {
                            "vulnerability": "VCID-8v51-tdqe-tbcp"
                        },
                        {
                            "vulnerability": "VCID-9bru-3rtm-sfey"
                        },
                        {
                            "vulnerability": "VCID-9rrq-d3g4-jyfy"
                        },
                        {
                            "vulnerability": "VCID-9wsp-xbm7-yfb9"
                        },
                        {
                            "vulnerability": "VCID-a454-61sh-j7ay"
                        },
                        {
                            "vulnerability": "VCID-cc41-mkuk-2fgu"
                        },
                        {
                            "vulnerability": "VCID-dq8r-defv-hbg6"
                        },
                        {
                            "vulnerability": "VCID-dqu3-2d1w-bked"
                        },
                        {
                            "vulnerability": "VCID-dwp4-mc1w-4bcw"
                        },
                        {
                            "vulnerability": "VCID-emnd-q69n-a3fe"
                        },
                        {
                            "vulnerability": "VCID-euxu-gjpw-8yhs"
                        },
                        {
                            "vulnerability": "VCID-f5xb-v8j6-nye2"
                        },
                        {
                            "vulnerability": "VCID-fhfz-6h5m-hbed"
                        },
                        {
                            "vulnerability": "VCID-g9zj-fsa9-vkca"
                        },
                        {
                            "vulnerability": "VCID-gr5a-eqvx-n3ha"
                        },
                        {
                            "vulnerability": "VCID-hbnp-yx9t-bbfj"
                        },
                        {
                            "vulnerability": "VCID-hhxy-swz4-eqfy"
                        },
                        {
                            "vulnerability": "VCID-jset-t9qq-xfah"
                        },
                        {
                            "vulnerability": "VCID-jyxp-bjx8-kfbd"
                        },
                        {
                            "vulnerability": "VCID-ka1g-skuq-gqcs"
                        },
                        {
                            "vulnerability": "VCID-kvq6-38sd-77h7"
                        },
                        {
                            "vulnerability": "VCID-kw1q-k8cm-j7dj"
                        },
                        {
                            "vulnerability": "VCID-n59e-jkf6-13bf"
                        },
                        {
                            "vulnerability": "VCID-n99v-8wyx-a3cr"
                        },
                        {
                            "vulnerability": "VCID-nw2n-9b59-gbdm"
                        },
                        {
                            "vulnerability": "VCID-p1xn-hbgr-efby"
                        },
                        {
                            "vulnerability": "VCID-p3vt-v7gj-gqbc"
                        },
                        {
                            "vulnerability": "VCID-pest-xjma-sfbn"
                        },
                        {
                            "vulnerability": "VCID-pgrh-f1dv-27dh"
                        },
                        {
                            "vulnerability": "VCID-pj46-9jp7-33ha"
                        },
                        {
                            "vulnerability": "VCID-r4kz-m7m8-c3b2"
                        },
                        {
                            "vulnerability": "VCID-ruxz-24k9-sbcf"
                        },
                        {
                            "vulnerability": "VCID-sqkd-cwbk-tkec"
                        },
                        {
                            "vulnerability": "VCID-szq9-t587-83h2"
                        },
                        {
                            "vulnerability": "VCID-tafy-p8yj-ukdv"
                        },
                        {
                            "vulnerability": "VCID-than-1kz8-yucx"
                        },
                        {
                            "vulnerability": "VCID-tz5h-hd3e-rbbv"
                        },
                        {
                            "vulnerability": "VCID-uvrh-s5dy-puc5"
                        },
                        {
                            "vulnerability": "VCID-uyug-vjrw-87h6"
                        },
                        {
                            "vulnerability": "VCID-uzrt-axb3-qfcs"
                        },
                        {
                            "vulnerability": "VCID-vx8c-nssy-ubaj"
                        },
                        {
                            "vulnerability": "VCID-vzyy-16xe-qkgm"
                        },
                        {
                            "vulnerability": "VCID-w8d1-9zry-wydv"
                        },
                        {
                            "vulnerability": "VCID-wvu1-rfc1-zya9"
                        },
                        {
                            "vulnerability": "VCID-x9wt-jmne-vudk"
                        },
                        {
                            "vulnerability": "VCID-y54q-e569-p7cx"
                        },
                        {
                            "vulnerability": "VCID-yahm-29wh-z3e9"
                        },
                        {
                            "vulnerability": "VCID-yj9c-fda5-57g2"
                        },
                        {
                            "vulnerability": "VCID-zgb6-kq8s-w3dm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.13-1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1089478?format=api",
                    "purl": "pkg:deb/debian/linux@6.19.14-1~bpo13%2B1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.14-1~bpo13%252B1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1077786?format=api",
                    "purl": "pkg:deb/debian/linux@6.19.14-1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1apd-wwuv-cbem"
                        },
                        {
                            "vulnerability": "VCID-23s6-fs1s-4kfb"
                        },
                        {
                            "vulnerability": "VCID-359m-ajks-23ef"
                        },
                        {
                            "vulnerability": "VCID-3apf-j1g4-vfbr"
                        },
                        {
                            "vulnerability": "VCID-43df-n4rn-nua1"
                        },
                        {
                            "vulnerability": "VCID-49sp-s742-dbe6"
                        },
                        {
                            "vulnerability": "VCID-4a7s-trcw-nube"
                        },
                        {
                            "vulnerability": "VCID-5t5f-4e1q-23bd"
                        },
                        {
                            "vulnerability": "VCID-7m8f-1q1y-6uap"
                        },
                        {
                            "vulnerability": "VCID-9x33-33np-c7bv"
                        },
                        {
                            "vulnerability": "VCID-9zzh-5tb2-m7aa"
                        },
                        {
                            "vulnerability": "VCID-aaq7-t35x-t7gc"
                        },
                        {
                            "vulnerability": "VCID-c5x4-1mbq-quch"
                        },
                        {
                            "vulnerability": "VCID-c7wz-4crx-3fgt"
                        },
                        {
                            "vulnerability": "VCID-dpjc-pacw-8bfq"
                        },
                        {
                            "vulnerability": "VCID-dq8r-defv-hbg6"
                        },
                        {
                            "vulnerability": "VCID-f832-cd1v-x3dc"
                        },
                        {
                            "vulnerability": "VCID-hv1g-619g-4yhx"
                        },
                        {
                            "vulnerability": "VCID-hxgq-6b1c-uff9"
                        },
                        {
                            "vulnerability": "VCID-n1gz-v4eb-vqec"
                        },
                        {
                            "vulnerability": "VCID-n537-dmm4-7kas"
                        },
                        {
                            "vulnerability": "VCID-n59e-jkf6-13bf"
                        },
                        {
                            "vulnerability": "VCID-naqw-tuak-xqgc"
                        },
                        {
                            "vulnerability": "VCID-p3vt-v7gj-gqbc"
                        },
                        {
                            "vulnerability": "VCID-rfwn-gj6g-ubbs"
                        },
                        {
                            "vulnerability": "VCID-rmmf-ey8e-eubr"
                        },
                        {
                            "vulnerability": "VCID-tm5u-v65w-8uep"
                        },
                        {
                            "vulnerability": "VCID-wnxx-8abs-5ucw"
                        },
                        {
                            "vulnerability": "VCID-x7bw-5cam-kubb"
                        },
                        {
                            "vulnerability": "VCID-xbam-fvfs-fydw"
                        },
                        {
                            "vulnerability": "VCID-xfew-wxwz-yka3"
                        },
                        {
                            "vulnerability": "VCID-y28b-ghum-ykek"
                        },
                        {
                            "vulnerability": "VCID-y5aq-zmbx-suft"
                        },
                        {
                            "vulnerability": "VCID-zasa-vpjy-nyhm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.14-1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067255?format=api",
                    "purl": "pkg:deb/debian/linux@7.0-1~exp1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@7.0-1~exp1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1089393?format=api",
                    "purl": "pkg:deb/debian/linux@7.0.3-1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-dq8r-defv-hbg6"
                        },
                        {
                            "vulnerability": "VCID-n59e-jkf6-13bf"
                        },
                        {
                            "vulnerability": "VCID-p3vt-v7gj-gqbc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@7.0.3-1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1105438?format=api",
                    "purl": "pkg:deb/debian/linux@7.0.4-1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-dq8r-defv-hbg6"
                        },
                        {
                            "vulnerability": "VCID-n59e-jkf6-13bf"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@7.0.4-1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1105449?format=api",
                    "purl": "pkg:deb/debian/linux@7.1~rc2-1~exp1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@7.1~rc2-1~exp1"
                }
            ],
            "aliases": [
                "CVE-2022-3238"
            ],
            "risk_score": 3.5,
            "exploitability": "0.5",
            "weighted_severity": "7.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-n59e-jkf6-13bf"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/354500?format=api",
            "vulnerability_id": "VCID-n99v-8wyx-a3cr",
            "summary": "In the Linux kernel, the following vulnerability has been resolved:  ALSA: 6fire: fix use-after-free on disconnect  In usb6fire_chip_abort(), the chip struct is allocated as the card's private data (via snd_card_new with sizeof(struct sfire_chip)).  When snd_card_free_when_closed() is called and no file handles are open, the card and embedded chip are freed synchronously.  The subsequent chip->card = NULL write then hits freed slab memory.  Call trace:   usb6fire_chip_abort sound/usb/6fire/chip.c:59 [inline]   usb6fire_chip_disconnect+0x348/0x358 sound/usb/6fire/chip.c:182   usb_unbind_interface+0x1a8/0x88c drivers/usb/core/driver.c:458   ...   hub_event+0x1a04/0x4518 drivers/usb/core/hub.c:5953  Fix by moving the card lifecycle out of usb6fire_chip_abort() and into usb6fire_chip_disconnect().  The card pointer is saved in a local before any teardown, snd_card_disconnect() is called first to prevent new opens, URBs are aborted while chip is still valid, and snd_card_free_when_closed() is called last so chip is never accessed after the card may be freed.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31581.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H"
                        },
                        {
                            "value": "7.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31581.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31581",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.018",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0245",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02396",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0241",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0462",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31581"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31581",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31581"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2461471",
                    "reference_id": "2461471",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2461471"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994366?format=api",
                    "purl": "pkg:deb/debian/linux@6.1.4-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.1.4-1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994368?format=api",
                    "purl": "pkg:deb/debian/linux@6.1.162-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.1.162-1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994375?format=api",
                    "purl": "pkg:deb/debian/linux@6.12.74-2~bpo12%2B1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.12.74-2~bpo12%252B1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1089478?format=api",
                    "purl": "pkg:deb/debian/linux@6.19.14-1~bpo13%2B1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.14-1~bpo13%252B1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1077786?format=api",
                    "purl": "pkg:deb/debian/linux@6.19.14-1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1apd-wwuv-cbem"
                        },
                        {
                            "vulnerability": "VCID-23s6-fs1s-4kfb"
                        },
                        {
                            "vulnerability": "VCID-359m-ajks-23ef"
                        },
                        {
                            "vulnerability": "VCID-3apf-j1g4-vfbr"
                        },
                        {
                            "vulnerability": "VCID-43df-n4rn-nua1"
                        },
                        {
                            "vulnerability": "VCID-49sp-s742-dbe6"
                        },
                        {
                            "vulnerability": "VCID-4a7s-trcw-nube"
                        },
                        {
                            "vulnerability": "VCID-5t5f-4e1q-23bd"
                        },
                        {
                            "vulnerability": "VCID-7m8f-1q1y-6uap"
                        },
                        {
                            "vulnerability": "VCID-9x33-33np-c7bv"
                        },
                        {
                            "vulnerability": "VCID-9zzh-5tb2-m7aa"
                        },
                        {
                            "vulnerability": "VCID-aaq7-t35x-t7gc"
                        },
                        {
                            "vulnerability": "VCID-c5x4-1mbq-quch"
                        },
                        {
                            "vulnerability": "VCID-c7wz-4crx-3fgt"
                        },
                        {
                            "vulnerability": "VCID-dpjc-pacw-8bfq"
                        },
                        {
                            "vulnerability": "VCID-dq8r-defv-hbg6"
                        },
                        {
                            "vulnerability": "VCID-f832-cd1v-x3dc"
                        },
                        {
                            "vulnerability": "VCID-hv1g-619g-4yhx"
                        },
                        {
                            "vulnerability": "VCID-hxgq-6b1c-uff9"
                        },
                        {
                            "vulnerability": "VCID-n1gz-v4eb-vqec"
                        },
                        {
                            "vulnerability": "VCID-n537-dmm4-7kas"
                        },
                        {
                            "vulnerability": "VCID-n59e-jkf6-13bf"
                        },
                        {
                            "vulnerability": "VCID-naqw-tuak-xqgc"
                        },
                        {
                            "vulnerability": "VCID-p3vt-v7gj-gqbc"
                        },
                        {
                            "vulnerability": "VCID-rfwn-gj6g-ubbs"
                        },
                        {
                            "vulnerability": "VCID-rmmf-ey8e-eubr"
                        },
                        {
                            "vulnerability": "VCID-tm5u-v65w-8uep"
                        },
                        {
                            "vulnerability": "VCID-wnxx-8abs-5ucw"
                        },
                        {
                            "vulnerability": "VCID-x7bw-5cam-kubb"
                        },
                        {
                            "vulnerability": "VCID-xbam-fvfs-fydw"
                        },
                        {
                            "vulnerability": "VCID-xfew-wxwz-yka3"
                        },
                        {
                            "vulnerability": "VCID-y28b-ghum-ykek"
                        },
                        {
                            "vulnerability": "VCID-y5aq-zmbx-suft"
                        },
                        {
                            "vulnerability": "VCID-zasa-vpjy-nyhm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.14-1"
                }
            ],
            "aliases": [
                "CVE-2026-31581"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-n99v-8wyx-a3cr"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/354520?format=api",
            "vulnerability_id": "VCID-nw2n-9b59-gbdm",
            "summary": "In the Linux kernel, the following vulnerability has been resolved:  vfio/xe: Reorganize the init to decouple migration from reset  Attempting to issue reset on VF devices that don't support migration leads to the following:    BUG: unable to handle page fault for address: 00000000000011f8   #PF: supervisor read access in kernel mode   #PF: error_code(0x0000) - not-present page   PGD 0 P4D 0   Oops: Oops: 0000 [#1] SMP NOPTI   CPU: 2 UID: 0 PID: 7443 Comm: xe_sriov_flr Tainted: G S   U              7.0.0-rc1-lgci-xe-xe-4588-cec43d5c2696af219-nodebug+ #1 PREEMPT(lazy)   Tainted: [S]=CPU_OUT_OF_SPEC, [U]=USER   Hardware name: Intel Corporation Alder Lake Client Platform/AlderLake-P DDR4 RVP, BIOS RPLPFWI1.R00.4035.A00.2301200723 01/20/2023   RIP: 0010:xe_sriov_vfio_wait_flr_done+0xc/0x80 [xe]   Code: ff c3 cc cc cc cc 0f 1f 84 00 00 00 00 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 0f 1f 44 00 00 55 48 89 e5 41 54 53 <83> bf f8 11 00 00 02 75 61 41 89 f4 85 f6 74 52 48 8b 47 08 48 89   RSP: 0018:ffffc9000f7c39b8 EFLAGS: 00010202   RAX: ffffffffa04d8660 RBX: ffff88813e3e4000 RCX: 0000000000000000   RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000   RBP: ffffc9000f7c39c8 R08: 0000000000000000 R09: 0000000000000000   R10: 0000000000000000 R11: 0000000000000000 R12: ffff888101a48800   R13: ffff88813e3e4150 R14: ffff888130d0d008 R15: ffff88813e3e40d0   FS:  00007877d3d0d940(0000) GS:ffff88890b6d3000(0000) knlGS:0000000000000000   CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033   CR2: 00000000000011f8 CR3: 000000015a762000 CR4: 0000000000f52ef0   PKRU: 55555554   Call Trace:    <TASK>    xe_vfio_pci_reset_done+0x49/0x120 [xe_vfio_pci]    pci_dev_restore+0x3b/0x80    pci_reset_function+0x109/0x140    reset_store+0x5c/0xb0    dev_attr_store+0x17/0x40    sysfs_kf_write+0x72/0x90    kernfs_fop_write_iter+0x161/0x1f0    vfs_write+0x261/0x440    ksys_write+0x69/0xf0    __x64_sys_write+0x19/0x30    x64_sys_call+0x259/0x26e0    do_syscall_64+0xcb/0x1500    ? __fput+0x1a2/0x2d0    ? fput_close_sync+0x3d/0xa0    ? __x64_sys_close+0x3e/0x90    ? x64_sys_call+0x1b7c/0x26e0    ? do_syscall_64+0x109/0x1500    ? __task_pid_nr_ns+0x68/0x100    ? __do_sys_getpid+0x1d/0x30    ? x64_sys_call+0x10b5/0x26e0    ? do_syscall_64+0x109/0x1500    ? putname+0x41/0x90    ? do_faccessat+0x1e8/0x300    ? __x64_sys_access+0x1c/0x30    ? x64_sys_call+0x1822/0x26e0    ? do_syscall_64+0x109/0x1500    ? tick_program_event+0x43/0xa0    ? hrtimer_interrupt+0x126/0x260    ? irqentry_exit+0xb2/0x710    entry_SYSCALL_64_after_hwframe+0x76/0x7e   RIP: 0033:0x7877d5f1c5a4   Code: c7 00 16 00 00 00 b8 ff ff ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 f3 0f 1e fa 80 3d a5 ea 0e 00 00 74 13 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 54 c3 0f 1f 00 55 48 89 e5 48 83 ec 20 48 89   RSP: 002b:00007fff48e5f908 EFLAGS: 00000202 ORIG_RAX: 0000000000000001   RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007877d5f1c5a4   RDX: 0000000000000001 RSI: 00007877d621b0c9 RDI: 0000000000000009   RBP: 0000000000000001 R08: 00005fb49113b010 R09: 0000000000000007   R10: 0000000000000000 R11: 0000000000000202 R12: 00007877d621b0c9   R13: 0000000000000009 R14: 00007fff48e5fac0 R15: 00007fff48e5fac0    </TASK>  This is caused by the fact that some of the xe_vfio_pci_core_device members needed for handling reset are only initialized as part of migration init.  Fix the problem by reorganizing the code to decouple VF init from migration init.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31601.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31601.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31601",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02151",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0215",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0218",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04102",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04986",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31601"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31601",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31601"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2461513",
                    "reference_id": "2461513",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2461513"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994366?format=api",
                    "purl": "pkg:deb/debian/linux@6.1.4-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.1.4-1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994368?format=api",
                    "purl": "pkg:deb/debian/linux@6.1.162-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.1.162-1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994375?format=api",
                    "purl": "pkg:deb/debian/linux@6.12.74-2~bpo12%2B1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.12.74-2~bpo12%252B1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1089478?format=api",
                    "purl": "pkg:deb/debian/linux@6.19.14-1~bpo13%2B1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.14-1~bpo13%252B1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1077786?format=api",
                    "purl": "pkg:deb/debian/linux@6.19.14-1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1apd-wwuv-cbem"
                        },
                        {
                            "vulnerability": "VCID-23s6-fs1s-4kfb"
                        },
                        {
                            "vulnerability": "VCID-359m-ajks-23ef"
                        },
                        {
                            "vulnerability": "VCID-3apf-j1g4-vfbr"
                        },
                        {
                            "vulnerability": "VCID-43df-n4rn-nua1"
                        },
                        {
                            "vulnerability": "VCID-49sp-s742-dbe6"
                        },
                        {
                            "vulnerability": "VCID-4a7s-trcw-nube"
                        },
                        {
                            "vulnerability": "VCID-5t5f-4e1q-23bd"
                        },
                        {
                            "vulnerability": "VCID-7m8f-1q1y-6uap"
                        },
                        {
                            "vulnerability": "VCID-9x33-33np-c7bv"
                        },
                        {
                            "vulnerability": "VCID-9zzh-5tb2-m7aa"
                        },
                        {
                            "vulnerability": "VCID-aaq7-t35x-t7gc"
                        },
                        {
                            "vulnerability": "VCID-c5x4-1mbq-quch"
                        },
                        {
                            "vulnerability": "VCID-c7wz-4crx-3fgt"
                        },
                        {
                            "vulnerability": "VCID-dpjc-pacw-8bfq"
                        },
                        {
                            "vulnerability": "VCID-dq8r-defv-hbg6"
                        },
                        {
                            "vulnerability": "VCID-f832-cd1v-x3dc"
                        },
                        {
                            "vulnerability": "VCID-hv1g-619g-4yhx"
                        },
                        {
                            "vulnerability": "VCID-hxgq-6b1c-uff9"
                        },
                        {
                            "vulnerability": "VCID-n1gz-v4eb-vqec"
                        },
                        {
                            "vulnerability": "VCID-n537-dmm4-7kas"
                        },
                        {
                            "vulnerability": "VCID-n59e-jkf6-13bf"
                        },
                        {
                            "vulnerability": "VCID-naqw-tuak-xqgc"
                        },
                        {
                            "vulnerability": "VCID-p3vt-v7gj-gqbc"
                        },
                        {
                            "vulnerability": "VCID-rfwn-gj6g-ubbs"
                        },
                        {
                            "vulnerability": "VCID-rmmf-ey8e-eubr"
                        },
                        {
                            "vulnerability": "VCID-tm5u-v65w-8uep"
                        },
                        {
                            "vulnerability": "VCID-wnxx-8abs-5ucw"
                        },
                        {
                            "vulnerability": "VCID-x7bw-5cam-kubb"
                        },
                        {
                            "vulnerability": "VCID-xbam-fvfs-fydw"
                        },
                        {
                            "vulnerability": "VCID-xfew-wxwz-yka3"
                        },
                        {
                            "vulnerability": "VCID-y28b-ghum-ykek"
                        },
                        {
                            "vulnerability": "VCID-y5aq-zmbx-suft"
                        },
                        {
                            "vulnerability": "VCID-zasa-vpjy-nyhm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.14-1"
                }
            ],
            "aliases": [
                "CVE-2026-31601"
            ],
            "risk_score": 1.4,
            "exploitability": "0.5",
            "weighted_severity": "2.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-nw2n-9b59-gbdm"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/354496?format=api",
            "vulnerability_id": "VCID-p1xn-hbgr-efby",
            "summary": "In the Linux kernel, the following vulnerability has been resolved:  nilfs2: fix NULL i_assoc_inode dereference in nilfs_mdt_save_to_shadow_map  The DAT inode's btree node cache (i_assoc_inode) is initialized lazily during btree operations. However, nilfs_mdt_save_to_shadow_map() assumes i_assoc_inode is already initialized when copying dirty pages to the shadow map during GC.  If NILFS_IOCTL_CLEAN_SEGMENTS is called immediately after mount before any btree operation has occurred on the DAT inode, i_assoc_inode is NULL leading to a general protection fault.  Fix this by calling nilfs_attach_btree_node_cache() on the DAT inode in nilfs_dat_read() at mount time, ensuring i_assoc_inode is always initialized before any GC operation can use it.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31577.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31577.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31577",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01728",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02278",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02282",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02318",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0462",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31577"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31577",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31577"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2461561",
                    "reference_id": "2461561",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2461561"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994366?format=api",
                    "purl": "pkg:deb/debian/linux@6.1.4-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.1.4-1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994368?format=api",
                    "purl": "pkg:deb/debian/linux@6.1.162-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.1.162-1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994375?format=api",
                    "purl": "pkg:deb/debian/linux@6.12.74-2~bpo12%2B1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.12.74-2~bpo12%252B1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1089478?format=api",
                    "purl": "pkg:deb/debian/linux@6.19.14-1~bpo13%2B1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.14-1~bpo13%252B1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1077786?format=api",
                    "purl": "pkg:deb/debian/linux@6.19.14-1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1apd-wwuv-cbem"
                        },
                        {
                            "vulnerability": "VCID-23s6-fs1s-4kfb"
                        },
                        {
                            "vulnerability": "VCID-359m-ajks-23ef"
                        },
                        {
                            "vulnerability": "VCID-3apf-j1g4-vfbr"
                        },
                        {
                            "vulnerability": "VCID-43df-n4rn-nua1"
                        },
                        {
                            "vulnerability": "VCID-49sp-s742-dbe6"
                        },
                        {
                            "vulnerability": "VCID-4a7s-trcw-nube"
                        },
                        {
                            "vulnerability": "VCID-5t5f-4e1q-23bd"
                        },
                        {
                            "vulnerability": "VCID-7m8f-1q1y-6uap"
                        },
                        {
                            "vulnerability": "VCID-9x33-33np-c7bv"
                        },
                        {
                            "vulnerability": "VCID-9zzh-5tb2-m7aa"
                        },
                        {
                            "vulnerability": "VCID-aaq7-t35x-t7gc"
                        },
                        {
                            "vulnerability": "VCID-c5x4-1mbq-quch"
                        },
                        {
                            "vulnerability": "VCID-c7wz-4crx-3fgt"
                        },
                        {
                            "vulnerability": "VCID-dpjc-pacw-8bfq"
                        },
                        {
                            "vulnerability": "VCID-dq8r-defv-hbg6"
                        },
                        {
                            "vulnerability": "VCID-f832-cd1v-x3dc"
                        },
                        {
                            "vulnerability": "VCID-hv1g-619g-4yhx"
                        },
                        {
                            "vulnerability": "VCID-hxgq-6b1c-uff9"
                        },
                        {
                            "vulnerability": "VCID-n1gz-v4eb-vqec"
                        },
                        {
                            "vulnerability": "VCID-n537-dmm4-7kas"
                        },
                        {
                            "vulnerability": "VCID-n59e-jkf6-13bf"
                        },
                        {
                            "vulnerability": "VCID-naqw-tuak-xqgc"
                        },
                        {
                            "vulnerability": "VCID-p3vt-v7gj-gqbc"
                        },
                        {
                            "vulnerability": "VCID-rfwn-gj6g-ubbs"
                        },
                        {
                            "vulnerability": "VCID-rmmf-ey8e-eubr"
                        },
                        {
                            "vulnerability": "VCID-tm5u-v65w-8uep"
                        },
                        {
                            "vulnerability": "VCID-wnxx-8abs-5ucw"
                        },
                        {
                            "vulnerability": "VCID-x7bw-5cam-kubb"
                        },
                        {
                            "vulnerability": "VCID-xbam-fvfs-fydw"
                        },
                        {
                            "vulnerability": "VCID-xfew-wxwz-yka3"
                        },
                        {
                            "vulnerability": "VCID-y28b-ghum-ykek"
                        },
                        {
                            "vulnerability": "VCID-y5aq-zmbx-suft"
                        },
                        {
                            "vulnerability": "VCID-zasa-vpjy-nyhm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.14-1"
                }
            ],
            "aliases": [
                "CVE-2026-31577"
            ],
            "risk_score": 1.4,
            "exploitability": "0.5",
            "weighted_severity": "2.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-p1xn-hbgr-efby"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/72268?format=api",
            "vulnerability_id": "VCID-p3vt-v7gj-gqbc",
            "summary": "kernel: io_uring: check if iowq is killed before queuing",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-56709.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-56709.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-56709",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09547",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09275",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09424",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09479",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09446",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09407",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0932",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09475",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00037",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10962",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00037",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10803",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00037",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10977",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00037",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11039",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00037",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10863",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00037",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10939",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00037",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10993",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00037",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10994",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-56709"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56709",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56709"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2334795",
                    "reference_id": "2334795",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2334795"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:20518",
                    "reference_id": "RHSA-2025:20518",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:20518"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7379-1/",
                    "reference_id": "USN-7379-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7379-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7379-2/",
                    "reference_id": "USN-7379-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7379-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7380-1/",
                    "reference_id": "USN-7380-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7380-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7381-1/",
                    "reference_id": "USN-7381-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7381-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7382-1/",
                    "reference_id": "USN-7382-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7382-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7513-1/",
                    "reference_id": "USN-7513-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7513-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7513-2/",
                    "reference_id": "USN-7513-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7513-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7513-3/",
                    "reference_id": "USN-7513-3",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7513-3/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7513-4/",
                    "reference_id": "USN-7513-4",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7513-4/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7513-5/",
                    "reference_id": "USN-7513-5",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7513-5/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7514-1/",
                    "reference_id": "USN-7514-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7514-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7515-1/",
                    "reference_id": "USN-7515-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7515-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7515-2/",
                    "reference_id": "USN-7515-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7515-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7522-1/",
                    "reference_id": "USN-7522-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7522-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7523-1/",
                    "reference_id": "USN-7523-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7523-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7524-1/",
                    "reference_id": "USN-7524-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7524-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994375?format=api",
                    "purl": "pkg:deb/debian/linux@6.12.74-2~bpo12%2B1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.12.74-2~bpo12%252B1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1068081?format=api",
                    "purl": "pkg:deb/debian/linux@6.19.11-1~bpo13%2B1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.11-1~bpo13%252B1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1026106?format=api",
                    "purl": "pkg:deb/debian/linux@6.19.11-1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1g77-qwuy-nkg8"
                        },
                        {
                            "vulnerability": "VCID-1s77-djzb-xffp"
                        },
                        {
                            "vulnerability": "VCID-4jvb-unxd-3qg3"
                        },
                        {
                            "vulnerability": "VCID-5ahq-saw1-suf1"
                        },
                        {
                            "vulnerability": "VCID-94k1-ja9w-2fd2"
                        },
                        {
                            "vulnerability": "VCID-brte-gqy3-r3ax"
                        },
                        {
                            "vulnerability": "VCID-c7xf-x7d5-87gn"
                        },
                        {
                            "vulnerability": "VCID-dq8r-defv-hbg6"
                        },
                        {
                            "vulnerability": "VCID-fvvb-p7r7-zkbk"
                        },
                        {
                            "vulnerability": "VCID-gbkk-anun-a3ce"
                        },
                        {
                            "vulnerability": "VCID-n59e-jkf6-13bf"
                        },
                        {
                            "vulnerability": "VCID-p3vt-v7gj-gqbc"
                        },
                        {
                            "vulnerability": "VCID-p4by-fm53-yybk"
                        },
                        {
                            "vulnerability": "VCID-pmn9-t8by-myhb"
                        },
                        {
                            "vulnerability": "VCID-qsdm-cyzs-aufy"
                        },
                        {
                            "vulnerability": "VCID-texr-5weq-v3dw"
                        },
                        {
                            "vulnerability": "VCID-v813-y477-vkhn"
                        },
                        {
                            "vulnerability": "VCID-vzkt-5648-ukh7"
                        },
                        {
                            "vulnerability": "VCID-yqcj-27j2-tqb8"
                        },
                        {
                            "vulnerability": "VCID-zh73-s87g-vfff"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.11-1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067254?format=api",
                    "purl": "pkg:deb/debian/linux@6.19.12-1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-dq8r-defv-hbg6"
                        },
                        {
                            "vulnerability": "VCID-n59e-jkf6-13bf"
                        },
                        {
                            "vulnerability": "VCID-p3vt-v7gj-gqbc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.12-1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1088969?format=api",
                    "purl": "pkg:deb/debian/linux@6.19.13-1~bpo13%2B1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.13-1~bpo13%252B1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1068119?format=api",
                    "purl": "pkg:deb/debian/linux@6.19.13-1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-11nd-2f5c-ybe1"
                        },
                        {
                            "vulnerability": "VCID-1n41-qg8u-r7d5"
                        },
                        {
                            "vulnerability": "VCID-22zu-qy6y-aub1"
                        },
                        {
                            "vulnerability": "VCID-25at-2je8-2ufj"
                        },
                        {
                            "vulnerability": "VCID-2cky-e16g-yqgf"
                        },
                        {
                            "vulnerability": "VCID-2dp8-mmkf-w7dx"
                        },
                        {
                            "vulnerability": "VCID-31cj-5nhu-4qa9"
                        },
                        {
                            "vulnerability": "VCID-3mhu-519z-pbck"
                        },
                        {
                            "vulnerability": "VCID-3qmn-b1w4-jkg4"
                        },
                        {
                            "vulnerability": "VCID-3r34-452w-skc2"
                        },
                        {
                            "vulnerability": "VCID-46pr-2cfb-mbhn"
                        },
                        {
                            "vulnerability": "VCID-4e1f-qvnx-87fc"
                        },
                        {
                            "vulnerability": "VCID-4v3t-8s2w-rfbg"
                        },
                        {
                            "vulnerability": "VCID-5vkh-dbsm-vbgu"
                        },
                        {
                            "vulnerability": "VCID-656s-tkaz-m7bj"
                        },
                        {
                            "vulnerability": "VCID-6vtw-v3u5-buce"
                        },
                        {
                            "vulnerability": "VCID-878n-d9ss-rugc"
                        },
                        {
                            "vulnerability": "VCID-8v51-tdqe-tbcp"
                        },
                        {
                            "vulnerability": "VCID-9bru-3rtm-sfey"
                        },
                        {
                            "vulnerability": "VCID-9rrq-d3g4-jyfy"
                        },
                        {
                            "vulnerability": "VCID-9wsp-xbm7-yfb9"
                        },
                        {
                            "vulnerability": "VCID-a454-61sh-j7ay"
                        },
                        {
                            "vulnerability": "VCID-cc41-mkuk-2fgu"
                        },
                        {
                            "vulnerability": "VCID-dq8r-defv-hbg6"
                        },
                        {
                            "vulnerability": "VCID-dqu3-2d1w-bked"
                        },
                        {
                            "vulnerability": "VCID-dwp4-mc1w-4bcw"
                        },
                        {
                            "vulnerability": "VCID-emnd-q69n-a3fe"
                        },
                        {
                            "vulnerability": "VCID-euxu-gjpw-8yhs"
                        },
                        {
                            "vulnerability": "VCID-f5xb-v8j6-nye2"
                        },
                        {
                            "vulnerability": "VCID-fhfz-6h5m-hbed"
                        },
                        {
                            "vulnerability": "VCID-g9zj-fsa9-vkca"
                        },
                        {
                            "vulnerability": "VCID-gr5a-eqvx-n3ha"
                        },
                        {
                            "vulnerability": "VCID-hbnp-yx9t-bbfj"
                        },
                        {
                            "vulnerability": "VCID-hhxy-swz4-eqfy"
                        },
                        {
                            "vulnerability": "VCID-jset-t9qq-xfah"
                        },
                        {
                            "vulnerability": "VCID-jyxp-bjx8-kfbd"
                        },
                        {
                            "vulnerability": "VCID-ka1g-skuq-gqcs"
                        },
                        {
                            "vulnerability": "VCID-kvq6-38sd-77h7"
                        },
                        {
                            "vulnerability": "VCID-kw1q-k8cm-j7dj"
                        },
                        {
                            "vulnerability": "VCID-n59e-jkf6-13bf"
                        },
                        {
                            "vulnerability": "VCID-n99v-8wyx-a3cr"
                        },
                        {
                            "vulnerability": "VCID-nw2n-9b59-gbdm"
                        },
                        {
                            "vulnerability": "VCID-p1xn-hbgr-efby"
                        },
                        {
                            "vulnerability": "VCID-p3vt-v7gj-gqbc"
                        },
                        {
                            "vulnerability": "VCID-pest-xjma-sfbn"
                        },
                        {
                            "vulnerability": "VCID-pgrh-f1dv-27dh"
                        },
                        {
                            "vulnerability": "VCID-pj46-9jp7-33ha"
                        },
                        {
                            "vulnerability": "VCID-r4kz-m7m8-c3b2"
                        },
                        {
                            "vulnerability": "VCID-ruxz-24k9-sbcf"
                        },
                        {
                            "vulnerability": "VCID-sqkd-cwbk-tkec"
                        },
                        {
                            "vulnerability": "VCID-szq9-t587-83h2"
                        },
                        {
                            "vulnerability": "VCID-tafy-p8yj-ukdv"
                        },
                        {
                            "vulnerability": "VCID-than-1kz8-yucx"
                        },
                        {
                            "vulnerability": "VCID-tz5h-hd3e-rbbv"
                        },
                        {
                            "vulnerability": "VCID-uvrh-s5dy-puc5"
                        },
                        {
                            "vulnerability": "VCID-uyug-vjrw-87h6"
                        },
                        {
                            "vulnerability": "VCID-uzrt-axb3-qfcs"
                        },
                        {
                            "vulnerability": "VCID-vx8c-nssy-ubaj"
                        },
                        {
                            "vulnerability": "VCID-vzyy-16xe-qkgm"
                        },
                        {
                            "vulnerability": "VCID-w8d1-9zry-wydv"
                        },
                        {
                            "vulnerability": "VCID-wvu1-rfc1-zya9"
                        },
                        {
                            "vulnerability": "VCID-x9wt-jmne-vudk"
                        },
                        {
                            "vulnerability": "VCID-y54q-e569-p7cx"
                        },
                        {
                            "vulnerability": "VCID-yahm-29wh-z3e9"
                        },
                        {
                            "vulnerability": "VCID-yj9c-fda5-57g2"
                        },
                        {
                            "vulnerability": "VCID-zgb6-kq8s-w3dm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.13-1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1089478?format=api",
                    "purl": "pkg:deb/debian/linux@6.19.14-1~bpo13%2B1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.14-1~bpo13%252B1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1077786?format=api",
                    "purl": "pkg:deb/debian/linux@6.19.14-1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1apd-wwuv-cbem"
                        },
                        {
                            "vulnerability": "VCID-23s6-fs1s-4kfb"
                        },
                        {
                            "vulnerability": "VCID-359m-ajks-23ef"
                        },
                        {
                            "vulnerability": "VCID-3apf-j1g4-vfbr"
                        },
                        {
                            "vulnerability": "VCID-43df-n4rn-nua1"
                        },
                        {
                            "vulnerability": "VCID-49sp-s742-dbe6"
                        },
                        {
                            "vulnerability": "VCID-4a7s-trcw-nube"
                        },
                        {
                            "vulnerability": "VCID-5t5f-4e1q-23bd"
                        },
                        {
                            "vulnerability": "VCID-7m8f-1q1y-6uap"
                        },
                        {
                            "vulnerability": "VCID-9x33-33np-c7bv"
                        },
                        {
                            "vulnerability": "VCID-9zzh-5tb2-m7aa"
                        },
                        {
                            "vulnerability": "VCID-aaq7-t35x-t7gc"
                        },
                        {
                            "vulnerability": "VCID-c5x4-1mbq-quch"
                        },
                        {
                            "vulnerability": "VCID-c7wz-4crx-3fgt"
                        },
                        {
                            "vulnerability": "VCID-dpjc-pacw-8bfq"
                        },
                        {
                            "vulnerability": "VCID-dq8r-defv-hbg6"
                        },
                        {
                            "vulnerability": "VCID-f832-cd1v-x3dc"
                        },
                        {
                            "vulnerability": "VCID-hv1g-619g-4yhx"
                        },
                        {
                            "vulnerability": "VCID-hxgq-6b1c-uff9"
                        },
                        {
                            "vulnerability": "VCID-n1gz-v4eb-vqec"
                        },
                        {
                            "vulnerability": "VCID-n537-dmm4-7kas"
                        },
                        {
                            "vulnerability": "VCID-n59e-jkf6-13bf"
                        },
                        {
                            "vulnerability": "VCID-naqw-tuak-xqgc"
                        },
                        {
                            "vulnerability": "VCID-p3vt-v7gj-gqbc"
                        },
                        {
                            "vulnerability": "VCID-rfwn-gj6g-ubbs"
                        },
                        {
                            "vulnerability": "VCID-rmmf-ey8e-eubr"
                        },
                        {
                            "vulnerability": "VCID-tm5u-v65w-8uep"
                        },
                        {
                            "vulnerability": "VCID-wnxx-8abs-5ucw"
                        },
                        {
                            "vulnerability": "VCID-x7bw-5cam-kubb"
                        },
                        {
                            "vulnerability": "VCID-xbam-fvfs-fydw"
                        },
                        {
                            "vulnerability": "VCID-xfew-wxwz-yka3"
                        },
                        {
                            "vulnerability": "VCID-y28b-ghum-ykek"
                        },
                        {
                            "vulnerability": "VCID-y5aq-zmbx-suft"
                        },
                        {
                            "vulnerability": "VCID-zasa-vpjy-nyhm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.14-1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067255?format=api",
                    "purl": "pkg:deb/debian/linux@7.0-1~exp1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@7.0-1~exp1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1089393?format=api",
                    "purl": "pkg:deb/debian/linux@7.0.3-1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-dq8r-defv-hbg6"
                        },
                        {
                            "vulnerability": "VCID-n59e-jkf6-13bf"
                        },
                        {
                            "vulnerability": "VCID-p3vt-v7gj-gqbc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@7.0.3-1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1105438?format=api",
                    "purl": "pkg:deb/debian/linux@7.0.4-1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-dq8r-defv-hbg6"
                        },
                        {
                            "vulnerability": "VCID-n59e-jkf6-13bf"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@7.0.4-1"
                }
            ],
            "aliases": [
                "CVE-2024-56709"
            ],
            "risk_score": 2.0,
            "exploitability": "0.5",
            "weighted_severity": "4.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-p3vt-v7gj-gqbc"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/354502?format=api",
            "vulnerability_id": "VCID-pest-xjma-sfbn",
            "summary": "In the Linux kernel, the following vulnerability has been resolved:  media: em28xx: fix use-after-free in em28xx_v4l2_open()  em28xx_v4l2_open() reads dev->v4l2 without holding dev->lock, creating a race with em28xx_v4l2_init()'s error path and em28xx_v4l2_fini(), both of which free the em28xx_v4l2 struct and set dev->v4l2 to NULL under dev->lock.  This race leads to two issues:  - use-after-free in v4l2_fh_init() when accessing vdev->ctrl_handler,    since the video_device is embedded in the freed em28xx_v4l2 struct.  - NULL pointer dereference in em28xx_resolution_set() when accessing    v4l2->norm, since dev->v4l2 has been set to NULL.  Fix this by moving the mutex_lock() before the dev->v4l2 read and adding a NULL check for dev->v4l2 under the lock.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31583.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "7.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31583.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31583",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.018",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0245",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02396",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0241",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0462",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31583"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31583",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31583"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2461487",
                    "reference_id": "2461487",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2461487"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994366?format=api",
                    "purl": "pkg:deb/debian/linux@6.1.4-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.1.4-1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994368?format=api",
                    "purl": "pkg:deb/debian/linux@6.1.162-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.1.162-1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994375?format=api",
                    "purl": "pkg:deb/debian/linux@6.12.74-2~bpo12%2B1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.12.74-2~bpo12%252B1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1089478?format=api",
                    "purl": "pkg:deb/debian/linux@6.19.14-1~bpo13%2B1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.14-1~bpo13%252B1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1077786?format=api",
                    "purl": "pkg:deb/debian/linux@6.19.14-1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1apd-wwuv-cbem"
                        },
                        {
                            "vulnerability": "VCID-23s6-fs1s-4kfb"
                        },
                        {
                            "vulnerability": "VCID-359m-ajks-23ef"
                        },
                        {
                            "vulnerability": "VCID-3apf-j1g4-vfbr"
                        },
                        {
                            "vulnerability": "VCID-43df-n4rn-nua1"
                        },
                        {
                            "vulnerability": "VCID-49sp-s742-dbe6"
                        },
                        {
                            "vulnerability": "VCID-4a7s-trcw-nube"
                        },
                        {
                            "vulnerability": "VCID-5t5f-4e1q-23bd"
                        },
                        {
                            "vulnerability": "VCID-7m8f-1q1y-6uap"
                        },
                        {
                            "vulnerability": "VCID-9x33-33np-c7bv"
                        },
                        {
                            "vulnerability": "VCID-9zzh-5tb2-m7aa"
                        },
                        {
                            "vulnerability": "VCID-aaq7-t35x-t7gc"
                        },
                        {
                            "vulnerability": "VCID-c5x4-1mbq-quch"
                        },
                        {
                            "vulnerability": "VCID-c7wz-4crx-3fgt"
                        },
                        {
                            "vulnerability": "VCID-dpjc-pacw-8bfq"
                        },
                        {
                            "vulnerability": "VCID-dq8r-defv-hbg6"
                        },
                        {
                            "vulnerability": "VCID-f832-cd1v-x3dc"
                        },
                        {
                            "vulnerability": "VCID-hv1g-619g-4yhx"
                        },
                        {
                            "vulnerability": "VCID-hxgq-6b1c-uff9"
                        },
                        {
                            "vulnerability": "VCID-n1gz-v4eb-vqec"
                        },
                        {
                            "vulnerability": "VCID-n537-dmm4-7kas"
                        },
                        {
                            "vulnerability": "VCID-n59e-jkf6-13bf"
                        },
                        {
                            "vulnerability": "VCID-naqw-tuak-xqgc"
                        },
                        {
                            "vulnerability": "VCID-p3vt-v7gj-gqbc"
                        },
                        {
                            "vulnerability": "VCID-rfwn-gj6g-ubbs"
                        },
                        {
                            "vulnerability": "VCID-rmmf-ey8e-eubr"
                        },
                        {
                            "vulnerability": "VCID-tm5u-v65w-8uep"
                        },
                        {
                            "vulnerability": "VCID-wnxx-8abs-5ucw"
                        },
                        {
                            "vulnerability": "VCID-x7bw-5cam-kubb"
                        },
                        {
                            "vulnerability": "VCID-xbam-fvfs-fydw"
                        },
                        {
                            "vulnerability": "VCID-xfew-wxwz-yka3"
                        },
                        {
                            "vulnerability": "VCID-y28b-ghum-ykek"
                        },
                        {
                            "vulnerability": "VCID-y5aq-zmbx-suft"
                        },
                        {
                            "vulnerability": "VCID-zasa-vpjy-nyhm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.14-1"
                }
            ],
            "aliases": [
                "CVE-2026-31583"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pest-xjma-sfbn"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/354514?format=api",
            "vulnerability_id": "VCID-pgrh-f1dv-27dh",
            "summary": "In the Linux kernel, the following vulnerability has been resolved:  PCI: endpoint: pci-epf-vntb: Stop cmd_handler work in epf_ntb_epc_cleanup  Disable the delayed work before clearing BAR mappings and doorbells to avoid running the handler after resources have been torn down.    Unable to handle kernel paging request at virtual address ffff800083f46004   [...]   Internal error: Oops: 0000000096000007 [#1]  SMP   [...]   Call trace:    epf_ntb_cmd_handler+0x54/0x200 [pci_epf_vntb] (P)    process_one_work+0x154/0x3b0    worker_thread+0x2c8/0x400    kthread+0x148/0x210    ret_from_fork+0x10/0x20",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31595.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31595.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31595",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02278",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02282",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02318",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0462",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06767",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31595"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31595",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31595"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2461455",
                    "reference_id": "2461455",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2461455"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994366?format=api",
                    "purl": "pkg:deb/debian/linux@6.1.4-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.1.4-1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994368?format=api",
                    "purl": "pkg:deb/debian/linux@6.1.162-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.1.162-1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994375?format=api",
                    "purl": "pkg:deb/debian/linux@6.12.74-2~bpo12%2B1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.12.74-2~bpo12%252B1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1089478?format=api",
                    "purl": "pkg:deb/debian/linux@6.19.14-1~bpo13%2B1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.14-1~bpo13%252B1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1077786?format=api",
                    "purl": "pkg:deb/debian/linux@6.19.14-1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1apd-wwuv-cbem"
                        },
                        {
                            "vulnerability": "VCID-23s6-fs1s-4kfb"
                        },
                        {
                            "vulnerability": "VCID-359m-ajks-23ef"
                        },
                        {
                            "vulnerability": "VCID-3apf-j1g4-vfbr"
                        },
                        {
                            "vulnerability": "VCID-43df-n4rn-nua1"
                        },
                        {
                            "vulnerability": "VCID-49sp-s742-dbe6"
                        },
                        {
                            "vulnerability": "VCID-4a7s-trcw-nube"
                        },
                        {
                            "vulnerability": "VCID-5t5f-4e1q-23bd"
                        },
                        {
                            "vulnerability": "VCID-7m8f-1q1y-6uap"
                        },
                        {
                            "vulnerability": "VCID-9x33-33np-c7bv"
                        },
                        {
                            "vulnerability": "VCID-9zzh-5tb2-m7aa"
                        },
                        {
                            "vulnerability": "VCID-aaq7-t35x-t7gc"
                        },
                        {
                            "vulnerability": "VCID-c5x4-1mbq-quch"
                        },
                        {
                            "vulnerability": "VCID-c7wz-4crx-3fgt"
                        },
                        {
                            "vulnerability": "VCID-dpjc-pacw-8bfq"
                        },
                        {
                            "vulnerability": "VCID-dq8r-defv-hbg6"
                        },
                        {
                            "vulnerability": "VCID-f832-cd1v-x3dc"
                        },
                        {
                            "vulnerability": "VCID-hv1g-619g-4yhx"
                        },
                        {
                            "vulnerability": "VCID-hxgq-6b1c-uff9"
                        },
                        {
                            "vulnerability": "VCID-n1gz-v4eb-vqec"
                        },
                        {
                            "vulnerability": "VCID-n537-dmm4-7kas"
                        },
                        {
                            "vulnerability": "VCID-n59e-jkf6-13bf"
                        },
                        {
                            "vulnerability": "VCID-naqw-tuak-xqgc"
                        },
                        {
                            "vulnerability": "VCID-p3vt-v7gj-gqbc"
                        },
                        {
                            "vulnerability": "VCID-rfwn-gj6g-ubbs"
                        },
                        {
                            "vulnerability": "VCID-rmmf-ey8e-eubr"
                        },
                        {
                            "vulnerability": "VCID-tm5u-v65w-8uep"
                        },
                        {
                            "vulnerability": "VCID-wnxx-8abs-5ucw"
                        },
                        {
                            "vulnerability": "VCID-x7bw-5cam-kubb"
                        },
                        {
                            "vulnerability": "VCID-xbam-fvfs-fydw"
                        },
                        {
                            "vulnerability": "VCID-xfew-wxwz-yka3"
                        },
                        {
                            "vulnerability": "VCID-y28b-ghum-ykek"
                        },
                        {
                            "vulnerability": "VCID-y5aq-zmbx-suft"
                        },
                        {
                            "vulnerability": "VCID-zasa-vpjy-nyhm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.14-1"
                }
            ],
            "aliases": [
                "CVE-2026-31595"
            ],
            "risk_score": 1.2,
            "exploitability": "0.5",
            "weighted_severity": "2.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pgrh-f1dv-27dh"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/354518?format=api",
            "vulnerability_id": "VCID-pj46-9jp7-33ha",
            "summary": "In the Linux kernel, the following vulnerability has been resolved:  media: vidtv: fix NULL pointer dereference in vidtv_channel_pmt_match_sections  syzbot reported a general protection fault in vidtv_psi_desc_assign [1].  vidtv_psi_pmt_stream_init() can return NULL on memory allocation failure, but vidtv_channel_pmt_match_sections() does not check for this. When tail is NULL, the subsequent call to vidtv_psi_desc_assign(&tail->descriptor, desc) dereferences a NULL pointer offset, causing a general protection fault.  Add a NULL check after vidtv_psi_pmt_stream_init(). On failure, clean up the already-allocated stream chain and return.  [1] Oops: general protection fault, probably for non-canonical address 0xdffffc0000000000: 0000 [#1] SMP KASAN PTI KASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007] RIP: 0010:vidtv_psi_desc_assign+0x24/0x90 drivers/media/test-drivers/vidtv/vidtv_psi.c:629 Call Trace:  <TASK>  vidtv_channel_pmt_match_sections drivers/media/test-drivers/vidtv/vidtv_channel.c:349 [inline]  vidtv_channel_si_init+0x1445/0x1a50 drivers/media/test-drivers/vidtv/vidtv_channel.c:479  vidtv_mux_init+0x526/0xbe0 drivers/media/test-drivers/vidtv/vidtv_mux.c:519  vidtv_start_streaming drivers/media/test-drivers/vidtv/vidtv_bridge.c:194 [inline]  vidtv_start_feed+0x33e/0x4d0 drivers/media/test-drivers/vidtv/vidtv_bridge.c:239",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31599.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31599.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31599",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02278",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02282",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02318",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0462",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06767",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31599"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31599",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31599"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2461461",
                    "reference_id": "2461461",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2461461"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994366?format=api",
                    "purl": "pkg:deb/debian/linux@6.1.4-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.1.4-1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994368?format=api",
                    "purl": "pkg:deb/debian/linux@6.1.162-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.1.162-1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994375?format=api",
                    "purl": "pkg:deb/debian/linux@6.12.74-2~bpo12%2B1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.12.74-2~bpo12%252B1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1089478?format=api",
                    "purl": "pkg:deb/debian/linux@6.19.14-1~bpo13%2B1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.14-1~bpo13%252B1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1077786?format=api",
                    "purl": "pkg:deb/debian/linux@6.19.14-1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1apd-wwuv-cbem"
                        },
                        {
                            "vulnerability": "VCID-23s6-fs1s-4kfb"
                        },
                        {
                            "vulnerability": "VCID-359m-ajks-23ef"
                        },
                        {
                            "vulnerability": "VCID-3apf-j1g4-vfbr"
                        },
                        {
                            "vulnerability": "VCID-43df-n4rn-nua1"
                        },
                        {
                            "vulnerability": "VCID-49sp-s742-dbe6"
                        },
                        {
                            "vulnerability": "VCID-4a7s-trcw-nube"
                        },
                        {
                            "vulnerability": "VCID-5t5f-4e1q-23bd"
                        },
                        {
                            "vulnerability": "VCID-7m8f-1q1y-6uap"
                        },
                        {
                            "vulnerability": "VCID-9x33-33np-c7bv"
                        },
                        {
                            "vulnerability": "VCID-9zzh-5tb2-m7aa"
                        },
                        {
                            "vulnerability": "VCID-aaq7-t35x-t7gc"
                        },
                        {
                            "vulnerability": "VCID-c5x4-1mbq-quch"
                        },
                        {
                            "vulnerability": "VCID-c7wz-4crx-3fgt"
                        },
                        {
                            "vulnerability": "VCID-dpjc-pacw-8bfq"
                        },
                        {
                            "vulnerability": "VCID-dq8r-defv-hbg6"
                        },
                        {
                            "vulnerability": "VCID-f832-cd1v-x3dc"
                        },
                        {
                            "vulnerability": "VCID-hv1g-619g-4yhx"
                        },
                        {
                            "vulnerability": "VCID-hxgq-6b1c-uff9"
                        },
                        {
                            "vulnerability": "VCID-n1gz-v4eb-vqec"
                        },
                        {
                            "vulnerability": "VCID-n537-dmm4-7kas"
                        },
                        {
                            "vulnerability": "VCID-n59e-jkf6-13bf"
                        },
                        {
                            "vulnerability": "VCID-naqw-tuak-xqgc"
                        },
                        {
                            "vulnerability": "VCID-p3vt-v7gj-gqbc"
                        },
                        {
                            "vulnerability": "VCID-rfwn-gj6g-ubbs"
                        },
                        {
                            "vulnerability": "VCID-rmmf-ey8e-eubr"
                        },
                        {
                            "vulnerability": "VCID-tm5u-v65w-8uep"
                        },
                        {
                            "vulnerability": "VCID-wnxx-8abs-5ucw"
                        },
                        {
                            "vulnerability": "VCID-x7bw-5cam-kubb"
                        },
                        {
                            "vulnerability": "VCID-xbam-fvfs-fydw"
                        },
                        {
                            "vulnerability": "VCID-xfew-wxwz-yka3"
                        },
                        {
                            "vulnerability": "VCID-y28b-ghum-ykek"
                        },
                        {
                            "vulnerability": "VCID-y5aq-zmbx-suft"
                        },
                        {
                            "vulnerability": "VCID-zasa-vpjy-nyhm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.14-1"
                }
            ],
            "aliases": [
                "CVE-2026-31599"
            ],
            "risk_score": 1.4,
            "exploitability": "0.5",
            "weighted_severity": "2.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pj46-9jp7-33ha"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/354546?format=api",
            "vulnerability_id": "VCID-r4kz-m7m8-c3b2",
            "summary": "In the Linux kernel, the following vulnerability has been resolved:  i2c: s3c24xx: check the size of the SMBUS message before using it  The first byte of an i2c SMBUS message is the size, and it should be verified to ensure that it is in the range of 0..I2C_SMBUS_BLOCK_MAX before processing it.  This is the same logic that was added in commit a6e04f05ce0b (\"i2c: tegra: check msg length in SMBUS block read\") to the i2c tegra driver.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31627.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31627.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31627",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.018",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02396",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0241",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0245",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0462",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31627"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31627",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31627"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2461439",
                    "reference_id": "2461439",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2461439"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994366?format=api",
                    "purl": "pkg:deb/debian/linux@6.1.4-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.1.4-1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994368?format=api",
                    "purl": "pkg:deb/debian/linux@6.1.162-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.1.162-1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994375?format=api",
                    "purl": "pkg:deb/debian/linux@6.12.74-2~bpo12%2B1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.12.74-2~bpo12%252B1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1089478?format=api",
                    "purl": "pkg:deb/debian/linux@6.19.14-1~bpo13%2B1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.14-1~bpo13%252B1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1077786?format=api",
                    "purl": "pkg:deb/debian/linux@6.19.14-1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1apd-wwuv-cbem"
                        },
                        {
                            "vulnerability": "VCID-23s6-fs1s-4kfb"
                        },
                        {
                            "vulnerability": "VCID-359m-ajks-23ef"
                        },
                        {
                            "vulnerability": "VCID-3apf-j1g4-vfbr"
                        },
                        {
                            "vulnerability": "VCID-43df-n4rn-nua1"
                        },
                        {
                            "vulnerability": "VCID-49sp-s742-dbe6"
                        },
                        {
                            "vulnerability": "VCID-4a7s-trcw-nube"
                        },
                        {
                            "vulnerability": "VCID-5t5f-4e1q-23bd"
                        },
                        {
                            "vulnerability": "VCID-7m8f-1q1y-6uap"
                        },
                        {
                            "vulnerability": "VCID-9x33-33np-c7bv"
                        },
                        {
                            "vulnerability": "VCID-9zzh-5tb2-m7aa"
                        },
                        {
                            "vulnerability": "VCID-aaq7-t35x-t7gc"
                        },
                        {
                            "vulnerability": "VCID-c5x4-1mbq-quch"
                        },
                        {
                            "vulnerability": "VCID-c7wz-4crx-3fgt"
                        },
                        {
                            "vulnerability": "VCID-dpjc-pacw-8bfq"
                        },
                        {
                            "vulnerability": "VCID-dq8r-defv-hbg6"
                        },
                        {
                            "vulnerability": "VCID-f832-cd1v-x3dc"
                        },
                        {
                            "vulnerability": "VCID-hv1g-619g-4yhx"
                        },
                        {
                            "vulnerability": "VCID-hxgq-6b1c-uff9"
                        },
                        {
                            "vulnerability": "VCID-n1gz-v4eb-vqec"
                        },
                        {
                            "vulnerability": "VCID-n537-dmm4-7kas"
                        },
                        {
                            "vulnerability": "VCID-n59e-jkf6-13bf"
                        },
                        {
                            "vulnerability": "VCID-naqw-tuak-xqgc"
                        },
                        {
                            "vulnerability": "VCID-p3vt-v7gj-gqbc"
                        },
                        {
                            "vulnerability": "VCID-rfwn-gj6g-ubbs"
                        },
                        {
                            "vulnerability": "VCID-rmmf-ey8e-eubr"
                        },
                        {
                            "vulnerability": "VCID-tm5u-v65w-8uep"
                        },
                        {
                            "vulnerability": "VCID-wnxx-8abs-5ucw"
                        },
                        {
                            "vulnerability": "VCID-x7bw-5cam-kubb"
                        },
                        {
                            "vulnerability": "VCID-xbam-fvfs-fydw"
                        },
                        {
                            "vulnerability": "VCID-xfew-wxwz-yka3"
                        },
                        {
                            "vulnerability": "VCID-y28b-ghum-ykek"
                        },
                        {
                            "vulnerability": "VCID-y5aq-zmbx-suft"
                        },
                        {
                            "vulnerability": "VCID-zasa-vpjy-nyhm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.14-1"
                }
            ],
            "aliases": [
                "CVE-2026-31627"
            ],
            "risk_score": 1.7,
            "exploitability": "0.5",
            "weighted_severity": "3.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-r4kz-m7m8-c3b2"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/354542?format=api",
            "vulnerability_id": "VCID-ruxz-24k9-sbcf",
            "summary": "In the Linux kernel, the following vulnerability has been resolved:  net: usb: cdc-phonet: fix skb frags[] overflow in rx_complete()  A malicious USB device claiming to be a CDC Phonet modem can overflow the skb_shared_info->frags[] array by sending an unbounded sequence of full-page bulk transfers.  Drop the skb and increment the length error when the frag limit is reached.  This matches the same fix that commit f0813bcd2d9d (\"net: wwan: t7xx: fix potential skb->frags overflow in RX path\") did for the t7xx driver.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31623.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31623.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31623",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01728",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02278",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02282",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02318",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0462",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31623"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31623",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31623"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2461478",
                    "reference_id": "2461478",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2461478"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994366?format=api",
                    "purl": "pkg:deb/debian/linux@6.1.4-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.1.4-1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994368?format=api",
                    "purl": "pkg:deb/debian/linux@6.1.162-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.1.162-1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994375?format=api",
                    "purl": "pkg:deb/debian/linux@6.12.74-2~bpo12%2B1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.12.74-2~bpo12%252B1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1089478?format=api",
                    "purl": "pkg:deb/debian/linux@6.19.14-1~bpo13%2B1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.14-1~bpo13%252B1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1077786?format=api",
                    "purl": "pkg:deb/debian/linux@6.19.14-1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1apd-wwuv-cbem"
                        },
                        {
                            "vulnerability": "VCID-23s6-fs1s-4kfb"
                        },
                        {
                            "vulnerability": "VCID-359m-ajks-23ef"
                        },
                        {
                            "vulnerability": "VCID-3apf-j1g4-vfbr"
                        },
                        {
                            "vulnerability": "VCID-43df-n4rn-nua1"
                        },
                        {
                            "vulnerability": "VCID-49sp-s742-dbe6"
                        },
                        {
                            "vulnerability": "VCID-4a7s-trcw-nube"
                        },
                        {
                            "vulnerability": "VCID-5t5f-4e1q-23bd"
                        },
                        {
                            "vulnerability": "VCID-7m8f-1q1y-6uap"
                        },
                        {
                            "vulnerability": "VCID-9x33-33np-c7bv"
                        },
                        {
                            "vulnerability": "VCID-9zzh-5tb2-m7aa"
                        },
                        {
                            "vulnerability": "VCID-aaq7-t35x-t7gc"
                        },
                        {
                            "vulnerability": "VCID-c5x4-1mbq-quch"
                        },
                        {
                            "vulnerability": "VCID-c7wz-4crx-3fgt"
                        },
                        {
                            "vulnerability": "VCID-dpjc-pacw-8bfq"
                        },
                        {
                            "vulnerability": "VCID-dq8r-defv-hbg6"
                        },
                        {
                            "vulnerability": "VCID-f832-cd1v-x3dc"
                        },
                        {
                            "vulnerability": "VCID-hv1g-619g-4yhx"
                        },
                        {
                            "vulnerability": "VCID-hxgq-6b1c-uff9"
                        },
                        {
                            "vulnerability": "VCID-n1gz-v4eb-vqec"
                        },
                        {
                            "vulnerability": "VCID-n537-dmm4-7kas"
                        },
                        {
                            "vulnerability": "VCID-n59e-jkf6-13bf"
                        },
                        {
                            "vulnerability": "VCID-naqw-tuak-xqgc"
                        },
                        {
                            "vulnerability": "VCID-p3vt-v7gj-gqbc"
                        },
                        {
                            "vulnerability": "VCID-rfwn-gj6g-ubbs"
                        },
                        {
                            "vulnerability": "VCID-rmmf-ey8e-eubr"
                        },
                        {
                            "vulnerability": "VCID-tm5u-v65w-8uep"
                        },
                        {
                            "vulnerability": "VCID-wnxx-8abs-5ucw"
                        },
                        {
                            "vulnerability": "VCID-x7bw-5cam-kubb"
                        },
                        {
                            "vulnerability": "VCID-xbam-fvfs-fydw"
                        },
                        {
                            "vulnerability": "VCID-xfew-wxwz-yka3"
                        },
                        {
                            "vulnerability": "VCID-y28b-ghum-ykek"
                        },
                        {
                            "vulnerability": "VCID-y5aq-zmbx-suft"
                        },
                        {
                            "vulnerability": "VCID-zasa-vpjy-nyhm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.14-1"
                }
            ],
            "aliases": [
                "CVE-2026-31623"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ruxz-24k9-sbcf"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/354522?format=api",
            "vulnerability_id": "VCID-sqkd-cwbk-tkec",
            "summary": "In the Linux kernel, the following vulnerability has been resolved:  staging: sm750fb: fix division by zero in ps_to_hz()  ps_to_hz() is called from hw_sm750_crtc_set_mode() without validating that pixclock is non-zero. A zero pixclock passed via FBIOPUT_VSCREENINFO causes a division by zero.  Fix by rejecting zero pixclock in lynxfb_ops_check_var(), consistent with other framebuffer drivers.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31603.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31603.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31603",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02278",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02282",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02318",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0462",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06767",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31603"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31603",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31603"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2461450",
                    "reference_id": "2461450",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2461450"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994366?format=api",
                    "purl": "pkg:deb/debian/linux@6.1.4-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.1.4-1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994368?format=api",
                    "purl": "pkg:deb/debian/linux@6.1.162-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.1.162-1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994375?format=api",
                    "purl": "pkg:deb/debian/linux@6.12.74-2~bpo12%2B1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.12.74-2~bpo12%252B1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1089478?format=api",
                    "purl": "pkg:deb/debian/linux@6.19.14-1~bpo13%2B1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.14-1~bpo13%252B1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1077786?format=api",
                    "purl": "pkg:deb/debian/linux@6.19.14-1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1apd-wwuv-cbem"
                        },
                        {
                            "vulnerability": "VCID-23s6-fs1s-4kfb"
                        },
                        {
                            "vulnerability": "VCID-359m-ajks-23ef"
                        },
                        {
                            "vulnerability": "VCID-3apf-j1g4-vfbr"
                        },
                        {
                            "vulnerability": "VCID-43df-n4rn-nua1"
                        },
                        {
                            "vulnerability": "VCID-49sp-s742-dbe6"
                        },
                        {
                            "vulnerability": "VCID-4a7s-trcw-nube"
                        },
                        {
                            "vulnerability": "VCID-5t5f-4e1q-23bd"
                        },
                        {
                            "vulnerability": "VCID-7m8f-1q1y-6uap"
                        },
                        {
                            "vulnerability": "VCID-9x33-33np-c7bv"
                        },
                        {
                            "vulnerability": "VCID-9zzh-5tb2-m7aa"
                        },
                        {
                            "vulnerability": "VCID-aaq7-t35x-t7gc"
                        },
                        {
                            "vulnerability": "VCID-c5x4-1mbq-quch"
                        },
                        {
                            "vulnerability": "VCID-c7wz-4crx-3fgt"
                        },
                        {
                            "vulnerability": "VCID-dpjc-pacw-8bfq"
                        },
                        {
                            "vulnerability": "VCID-dq8r-defv-hbg6"
                        },
                        {
                            "vulnerability": "VCID-f832-cd1v-x3dc"
                        },
                        {
                            "vulnerability": "VCID-hv1g-619g-4yhx"
                        },
                        {
                            "vulnerability": "VCID-hxgq-6b1c-uff9"
                        },
                        {
                            "vulnerability": "VCID-n1gz-v4eb-vqec"
                        },
                        {
                            "vulnerability": "VCID-n537-dmm4-7kas"
                        },
                        {
                            "vulnerability": "VCID-n59e-jkf6-13bf"
                        },
                        {
                            "vulnerability": "VCID-naqw-tuak-xqgc"
                        },
                        {
                            "vulnerability": "VCID-p3vt-v7gj-gqbc"
                        },
                        {
                            "vulnerability": "VCID-rfwn-gj6g-ubbs"
                        },
                        {
                            "vulnerability": "VCID-rmmf-ey8e-eubr"
                        },
                        {
                            "vulnerability": "VCID-tm5u-v65w-8uep"
                        },
                        {
                            "vulnerability": "VCID-wnxx-8abs-5ucw"
                        },
                        {
                            "vulnerability": "VCID-x7bw-5cam-kubb"
                        },
                        {
                            "vulnerability": "VCID-xbam-fvfs-fydw"
                        },
                        {
                            "vulnerability": "VCID-xfew-wxwz-yka3"
                        },
                        {
                            "vulnerability": "VCID-y28b-ghum-ykek"
                        },
                        {
                            "vulnerability": "VCID-y5aq-zmbx-suft"
                        },
                        {
                            "vulnerability": "VCID-zasa-vpjy-nyhm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.14-1"
                }
            ],
            "aliases": [
                "CVE-2026-31603"
            ],
            "risk_score": 1.4,
            "exploitability": "0.5",
            "weighted_severity": "2.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-sqkd-cwbk-tkec"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/354527?format=api",
            "vulnerability_id": "VCID-szq9-t587-83h2",
            "summary": "In the Linux kernel, the following vulnerability has been resolved:  smb: server: avoid double-free in smb_direct_free_sendmsg after smb_direct_flush_send_list()  smb_direct_flush_send_list() already calls smb_direct_free_sendmsg(), so we should not call it again after post_sendmsg() moved it to the batch list.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31608.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31608.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31608",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0407",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00044",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13236",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00057",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17675",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00057",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17769",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00057",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1787",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31608"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31608",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31608"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2461452",
                    "reference_id": "2461452",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2461452"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994366?format=api",
                    "purl": "pkg:deb/debian/linux@6.1.4-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.1.4-1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994368?format=api",
                    "purl": "pkg:deb/debian/linux@6.1.162-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.1.162-1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994375?format=api",
                    "purl": "pkg:deb/debian/linux@6.12.74-2~bpo12%2B1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.12.74-2~bpo12%252B1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1089478?format=api",
                    "purl": "pkg:deb/debian/linux@6.19.14-1~bpo13%2B1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.14-1~bpo13%252B1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1077786?format=api",
                    "purl": "pkg:deb/debian/linux@6.19.14-1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1apd-wwuv-cbem"
                        },
                        {
                            "vulnerability": "VCID-23s6-fs1s-4kfb"
                        },
                        {
                            "vulnerability": "VCID-359m-ajks-23ef"
                        },
                        {
                            "vulnerability": "VCID-3apf-j1g4-vfbr"
                        },
                        {
                            "vulnerability": "VCID-43df-n4rn-nua1"
                        },
                        {
                            "vulnerability": "VCID-49sp-s742-dbe6"
                        },
                        {
                            "vulnerability": "VCID-4a7s-trcw-nube"
                        },
                        {
                            "vulnerability": "VCID-5t5f-4e1q-23bd"
                        },
                        {
                            "vulnerability": "VCID-7m8f-1q1y-6uap"
                        },
                        {
                            "vulnerability": "VCID-9x33-33np-c7bv"
                        },
                        {
                            "vulnerability": "VCID-9zzh-5tb2-m7aa"
                        },
                        {
                            "vulnerability": "VCID-aaq7-t35x-t7gc"
                        },
                        {
                            "vulnerability": "VCID-c5x4-1mbq-quch"
                        },
                        {
                            "vulnerability": "VCID-c7wz-4crx-3fgt"
                        },
                        {
                            "vulnerability": "VCID-dpjc-pacw-8bfq"
                        },
                        {
                            "vulnerability": "VCID-dq8r-defv-hbg6"
                        },
                        {
                            "vulnerability": "VCID-f832-cd1v-x3dc"
                        },
                        {
                            "vulnerability": "VCID-hv1g-619g-4yhx"
                        },
                        {
                            "vulnerability": "VCID-hxgq-6b1c-uff9"
                        },
                        {
                            "vulnerability": "VCID-n1gz-v4eb-vqec"
                        },
                        {
                            "vulnerability": "VCID-n537-dmm4-7kas"
                        },
                        {
                            "vulnerability": "VCID-n59e-jkf6-13bf"
                        },
                        {
                            "vulnerability": "VCID-naqw-tuak-xqgc"
                        },
                        {
                            "vulnerability": "VCID-p3vt-v7gj-gqbc"
                        },
                        {
                            "vulnerability": "VCID-rfwn-gj6g-ubbs"
                        },
                        {
                            "vulnerability": "VCID-rmmf-ey8e-eubr"
                        },
                        {
                            "vulnerability": "VCID-tm5u-v65w-8uep"
                        },
                        {
                            "vulnerability": "VCID-wnxx-8abs-5ucw"
                        },
                        {
                            "vulnerability": "VCID-x7bw-5cam-kubb"
                        },
                        {
                            "vulnerability": "VCID-xbam-fvfs-fydw"
                        },
                        {
                            "vulnerability": "VCID-xfew-wxwz-yka3"
                        },
                        {
                            "vulnerability": "VCID-y28b-ghum-ykek"
                        },
                        {
                            "vulnerability": "VCID-y5aq-zmbx-suft"
                        },
                        {
                            "vulnerability": "VCID-zasa-vpjy-nyhm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.14-1"
                }
            ],
            "aliases": [
                "CVE-2026-31608"
            ],
            "risk_score": 2.0,
            "exploitability": "0.5",
            "weighted_severity": "4.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-szq9-t587-83h2"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/354129?format=api",
            "vulnerability_id": "VCID-tafy-p8yj-ukdv",
            "summary": "",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31531.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31531.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31531",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0001",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0117",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.0001",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01177",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "7e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00553",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "7e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00547",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "7e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00548",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "7e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00555",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31531"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31531",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31531"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2461108",
                    "reference_id": "2461108",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2461108"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994366?format=api",
                    "purl": "pkg:deb/debian/linux@6.1.4-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.1.4-1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994368?format=api",
                    "purl": "pkg:deb/debian/linux@6.1.162-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.1.162-1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994375?format=api",
                    "purl": "pkg:deb/debian/linux@6.12.74-2~bpo12%2B1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.12.74-2~bpo12%252B1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1089478?format=api",
                    "purl": "pkg:deb/debian/linux@6.19.14-1~bpo13%2B1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.14-1~bpo13%252B1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1077786?format=api",
                    "purl": "pkg:deb/debian/linux@6.19.14-1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1apd-wwuv-cbem"
                        },
                        {
                            "vulnerability": "VCID-23s6-fs1s-4kfb"
                        },
                        {
                            "vulnerability": "VCID-359m-ajks-23ef"
                        },
                        {
                            "vulnerability": "VCID-3apf-j1g4-vfbr"
                        },
                        {
                            "vulnerability": "VCID-43df-n4rn-nua1"
                        },
                        {
                            "vulnerability": "VCID-49sp-s742-dbe6"
                        },
                        {
                            "vulnerability": "VCID-4a7s-trcw-nube"
                        },
                        {
                            "vulnerability": "VCID-5t5f-4e1q-23bd"
                        },
                        {
                            "vulnerability": "VCID-7m8f-1q1y-6uap"
                        },
                        {
                            "vulnerability": "VCID-9x33-33np-c7bv"
                        },
                        {
                            "vulnerability": "VCID-9zzh-5tb2-m7aa"
                        },
                        {
                            "vulnerability": "VCID-aaq7-t35x-t7gc"
                        },
                        {
                            "vulnerability": "VCID-c5x4-1mbq-quch"
                        },
                        {
                            "vulnerability": "VCID-c7wz-4crx-3fgt"
                        },
                        {
                            "vulnerability": "VCID-dpjc-pacw-8bfq"
                        },
                        {
                            "vulnerability": "VCID-dq8r-defv-hbg6"
                        },
                        {
                            "vulnerability": "VCID-f832-cd1v-x3dc"
                        },
                        {
                            "vulnerability": "VCID-hv1g-619g-4yhx"
                        },
                        {
                            "vulnerability": "VCID-hxgq-6b1c-uff9"
                        },
                        {
                            "vulnerability": "VCID-n1gz-v4eb-vqec"
                        },
                        {
                            "vulnerability": "VCID-n537-dmm4-7kas"
                        },
                        {
                            "vulnerability": "VCID-n59e-jkf6-13bf"
                        },
                        {
                            "vulnerability": "VCID-naqw-tuak-xqgc"
                        },
                        {
                            "vulnerability": "VCID-p3vt-v7gj-gqbc"
                        },
                        {
                            "vulnerability": "VCID-rfwn-gj6g-ubbs"
                        },
                        {
                            "vulnerability": "VCID-rmmf-ey8e-eubr"
                        },
                        {
                            "vulnerability": "VCID-tm5u-v65w-8uep"
                        },
                        {
                            "vulnerability": "VCID-wnxx-8abs-5ucw"
                        },
                        {
                            "vulnerability": "VCID-x7bw-5cam-kubb"
                        },
                        {
                            "vulnerability": "VCID-xbam-fvfs-fydw"
                        },
                        {
                            "vulnerability": "VCID-xfew-wxwz-yka3"
                        },
                        {
                            "vulnerability": "VCID-y28b-ghum-ykek"
                        },
                        {
                            "vulnerability": "VCID-y5aq-zmbx-suft"
                        },
                        {
                            "vulnerability": "VCID-zasa-vpjy-nyhm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.14-1"
                }
            ],
            "aliases": [
                "CVE-2026-31531"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tafy-p8yj-ukdv"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/354540?format=api",
            "vulnerability_id": "VCID-than-1kz8-yucx",
            "summary": "In the Linux kernel, the following vulnerability has been resolved:  bnge: return after auxiliary_device_uninit() in error path  When auxiliary_device_add() fails, the error block calls auxiliary_device_uninit() but does not return.  The uninit drops the last reference and synchronously runs bnge_aux_dev_release(), which sets bd->auxr_dev = NULL and frees the underlying object.  The subsequent bd->auxr_dev->net = bd->netdev then dereferences NULL, which is not a good thing to have happen when trying to clean up from an error.  Add the missing return, as the auxiliary bus documentation states is a requirement (seems that LLM tools read documentation better than humans do...)",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31621.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31621.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31621",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01664",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02151",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0215",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0218",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04986",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31621"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31621",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31621"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2461531",
                    "reference_id": "2461531",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2461531"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994366?format=api",
                    "purl": "pkg:deb/debian/linux@6.1.4-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.1.4-1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994368?format=api",
                    "purl": "pkg:deb/debian/linux@6.1.162-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.1.162-1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994375?format=api",
                    "purl": "pkg:deb/debian/linux@6.12.74-2~bpo12%2B1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.12.74-2~bpo12%252B1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1089478?format=api",
                    "purl": "pkg:deb/debian/linux@6.19.14-1~bpo13%2B1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.14-1~bpo13%252B1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1077786?format=api",
                    "purl": "pkg:deb/debian/linux@6.19.14-1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1apd-wwuv-cbem"
                        },
                        {
                            "vulnerability": "VCID-23s6-fs1s-4kfb"
                        },
                        {
                            "vulnerability": "VCID-359m-ajks-23ef"
                        },
                        {
                            "vulnerability": "VCID-3apf-j1g4-vfbr"
                        },
                        {
                            "vulnerability": "VCID-43df-n4rn-nua1"
                        },
                        {
                            "vulnerability": "VCID-49sp-s742-dbe6"
                        },
                        {
                            "vulnerability": "VCID-4a7s-trcw-nube"
                        },
                        {
                            "vulnerability": "VCID-5t5f-4e1q-23bd"
                        },
                        {
                            "vulnerability": "VCID-7m8f-1q1y-6uap"
                        },
                        {
                            "vulnerability": "VCID-9x33-33np-c7bv"
                        },
                        {
                            "vulnerability": "VCID-9zzh-5tb2-m7aa"
                        },
                        {
                            "vulnerability": "VCID-aaq7-t35x-t7gc"
                        },
                        {
                            "vulnerability": "VCID-c5x4-1mbq-quch"
                        },
                        {
                            "vulnerability": "VCID-c7wz-4crx-3fgt"
                        },
                        {
                            "vulnerability": "VCID-dpjc-pacw-8bfq"
                        },
                        {
                            "vulnerability": "VCID-dq8r-defv-hbg6"
                        },
                        {
                            "vulnerability": "VCID-f832-cd1v-x3dc"
                        },
                        {
                            "vulnerability": "VCID-hv1g-619g-4yhx"
                        },
                        {
                            "vulnerability": "VCID-hxgq-6b1c-uff9"
                        },
                        {
                            "vulnerability": "VCID-n1gz-v4eb-vqec"
                        },
                        {
                            "vulnerability": "VCID-n537-dmm4-7kas"
                        },
                        {
                            "vulnerability": "VCID-n59e-jkf6-13bf"
                        },
                        {
                            "vulnerability": "VCID-naqw-tuak-xqgc"
                        },
                        {
                            "vulnerability": "VCID-p3vt-v7gj-gqbc"
                        },
                        {
                            "vulnerability": "VCID-rfwn-gj6g-ubbs"
                        },
                        {
                            "vulnerability": "VCID-rmmf-ey8e-eubr"
                        },
                        {
                            "vulnerability": "VCID-tm5u-v65w-8uep"
                        },
                        {
                            "vulnerability": "VCID-wnxx-8abs-5ucw"
                        },
                        {
                            "vulnerability": "VCID-x7bw-5cam-kubb"
                        },
                        {
                            "vulnerability": "VCID-xbam-fvfs-fydw"
                        },
                        {
                            "vulnerability": "VCID-xfew-wxwz-yka3"
                        },
                        {
                            "vulnerability": "VCID-y28b-ghum-ykek"
                        },
                        {
                            "vulnerability": "VCID-y5aq-zmbx-suft"
                        },
                        {
                            "vulnerability": "VCID-zasa-vpjy-nyhm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.14-1"
                }
            ],
            "aliases": [
                "CVE-2026-31621"
            ],
            "risk_score": 1.4,
            "exploitability": "0.5",
            "weighted_severity": "2.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-than-1kz8-yucx"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/354516?format=api",
            "vulnerability_id": "VCID-tz5h-hd3e-rbbv",
            "summary": "In the Linux kernel, the following vulnerability has been resolved:  ocfs2: fix use-after-free in ocfs2_fault() when VM_FAULT_RETRY  filemap_fault() may drop the mmap_lock before returning VM_FAULT_RETRY, as documented in mm/filemap.c:    \"If our return value has VM_FAULT_RETRY set, it's because the mmap_lock   may be dropped before doing I/O or by lock_folio_maybe_drop_mmap().\"  When this happens, a concurrent munmap() can call remove_vma() and free the vm_area_struct via RCU. The saved 'vma' pointer in ocfs2_fault() then becomes a dangling pointer, and the subsequent trace_ocfs2_fault() call dereferences it -- a use-after-free.  Fix this by saving ip_blkno as a plain integer before calling filemap_fault(), and removing vma from the trace event. Since ip_blkno is copied by value before the lock can be dropped, it remains valid regardless of what happens to the vma or inode afterward.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31597.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31597.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31597",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.018",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02396",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0241",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0245",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0462",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31597"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31597",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31597"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2461484",
                    "reference_id": "2461484",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2461484"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994366?format=api",
                    "purl": "pkg:deb/debian/linux@6.1.4-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.1.4-1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994368?format=api",
                    "purl": "pkg:deb/debian/linux@6.1.162-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.1.162-1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994375?format=api",
                    "purl": "pkg:deb/debian/linux@6.12.74-2~bpo12%2B1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.12.74-2~bpo12%252B1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1089478?format=api",
                    "purl": "pkg:deb/debian/linux@6.19.14-1~bpo13%2B1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.14-1~bpo13%252B1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1077786?format=api",
                    "purl": "pkg:deb/debian/linux@6.19.14-1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1apd-wwuv-cbem"
                        },
                        {
                            "vulnerability": "VCID-23s6-fs1s-4kfb"
                        },
                        {
                            "vulnerability": "VCID-359m-ajks-23ef"
                        },
                        {
                            "vulnerability": "VCID-3apf-j1g4-vfbr"
                        },
                        {
                            "vulnerability": "VCID-43df-n4rn-nua1"
                        },
                        {
                            "vulnerability": "VCID-49sp-s742-dbe6"
                        },
                        {
                            "vulnerability": "VCID-4a7s-trcw-nube"
                        },
                        {
                            "vulnerability": "VCID-5t5f-4e1q-23bd"
                        },
                        {
                            "vulnerability": "VCID-7m8f-1q1y-6uap"
                        },
                        {
                            "vulnerability": "VCID-9x33-33np-c7bv"
                        },
                        {
                            "vulnerability": "VCID-9zzh-5tb2-m7aa"
                        },
                        {
                            "vulnerability": "VCID-aaq7-t35x-t7gc"
                        },
                        {
                            "vulnerability": "VCID-c5x4-1mbq-quch"
                        },
                        {
                            "vulnerability": "VCID-c7wz-4crx-3fgt"
                        },
                        {
                            "vulnerability": "VCID-dpjc-pacw-8bfq"
                        },
                        {
                            "vulnerability": "VCID-dq8r-defv-hbg6"
                        },
                        {
                            "vulnerability": "VCID-f832-cd1v-x3dc"
                        },
                        {
                            "vulnerability": "VCID-hv1g-619g-4yhx"
                        },
                        {
                            "vulnerability": "VCID-hxgq-6b1c-uff9"
                        },
                        {
                            "vulnerability": "VCID-n1gz-v4eb-vqec"
                        },
                        {
                            "vulnerability": "VCID-n537-dmm4-7kas"
                        },
                        {
                            "vulnerability": "VCID-n59e-jkf6-13bf"
                        },
                        {
                            "vulnerability": "VCID-naqw-tuak-xqgc"
                        },
                        {
                            "vulnerability": "VCID-p3vt-v7gj-gqbc"
                        },
                        {
                            "vulnerability": "VCID-rfwn-gj6g-ubbs"
                        },
                        {
                            "vulnerability": "VCID-rmmf-ey8e-eubr"
                        },
                        {
                            "vulnerability": "VCID-tm5u-v65w-8uep"
                        },
                        {
                            "vulnerability": "VCID-wnxx-8abs-5ucw"
                        },
                        {
                            "vulnerability": "VCID-x7bw-5cam-kubb"
                        },
                        {
                            "vulnerability": "VCID-xbam-fvfs-fydw"
                        },
                        {
                            "vulnerability": "VCID-xfew-wxwz-yka3"
                        },
                        {
                            "vulnerability": "VCID-y28b-ghum-ykek"
                        },
                        {
                            "vulnerability": "VCID-y5aq-zmbx-suft"
                        },
                        {
                            "vulnerability": "VCID-zasa-vpjy-nyhm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.14-1"
                }
            ],
            "aliases": [
                "CVE-2026-31597"
            ],
            "risk_score": 1.9,
            "exploitability": "0.5",
            "weighted_severity": "3.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tz5h-hd3e-rbbv"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/354506?format=api",
            "vulnerability_id": "VCID-uvrh-s5dy-puc5",
            "summary": "In the Linux kernel, the following vulnerability has been resolved:  ASoC: qcom: q6apm: move component registration to unmanaged version  q6apm component registers dais dynamically from ASoC toplology, which are allocated using device managed version apis. Allocating both component and dynamic dais using managed version could lead to incorrect free ordering, dai will be freed while component still holding references to it.  Fix this issue by moving component to unmanged version so that the dai pointers are only freeded after the component is removed.  ================================================================== BUG: KASAN: slab-use-after-free in snd_soc_del_component_unlocked+0x3d4/0x400 [snd_soc_core] Read of size 8 at addr ffff00084493a6e8 by task kworker/u48:0/3426 Tainted: [W]=WARN Hardware name: LENOVO 21N2ZC5PUS/21N2ZC5PUS, BIOS N42ET57W (1.31 ) 08/08/2024 Workqueue: pdr_notifier_wq pdr_notifier_work [pdr_interface] Call trace:  show_stack+0x28/0x7c (C)  dump_stack_lvl+0x60/0x80  print_report+0x160/0x4b4  kasan_report+0xac/0xfc  __asan_report_load8_noabort+0x20/0x34  snd_soc_del_component_unlocked+0x3d4/0x400 [snd_soc_core]  snd_soc_unregister_component_by_driver+0x50/0x88 [snd_soc_core]  devm_component_release+0x30/0x5c [snd_soc_core]  devres_release_all+0x13c/0x210  device_unbind_cleanup+0x20/0x190  device_release_driver_internal+0x350/0x468  device_release_driver+0x18/0x30  bus_remove_device+0x1a0/0x35c  device_del+0x314/0x7f0  device_unregister+0x20/0xbc  apr_remove_device+0x5c/0x7c [apr]  device_for_each_child+0xd8/0x160  apr_pd_status+0x7c/0xa8 [apr]  pdr_notifier_work+0x114/0x240 [pdr_interface]  process_one_work+0x500/0xb70  worker_thread+0x630/0xfb0  kthread+0x370/0x6c0  ret_from_fork+0x10/0x20  Allocated by task 77:  kasan_save_stack+0x40/0x68  kasan_save_track+0x20/0x40  kasan_save_alloc_info+0x44/0x58  __kasan_kmalloc+0xbc/0xdc  __kmalloc_node_track_caller_noprof+0x1f4/0x620  devm_kmalloc+0x7c/0x1c8  snd_soc_register_dai+0x50/0x4f0 [snd_soc_core]  soc_tplg_pcm_elems_load+0x55c/0x1eb8 [snd_soc_core]  snd_soc_tplg_component_load+0x4f8/0xb60 [snd_soc_core]  audioreach_tplg_init+0x124/0x1fc [snd_q6apm]  q6apm_audio_probe+0x10/0x1c [snd_q6apm]  snd_soc_component_probe+0x5c/0x118 [snd_soc_core]  soc_probe_component+0x44c/0xaf0 [snd_soc_core]  snd_soc_bind_card+0xad0/0x2370 [snd_soc_core]  snd_soc_register_card+0x3b0/0x4c0 [snd_soc_core]  devm_snd_soc_register_card+0x50/0xc8 [snd_soc_core]  x1e80100_platform_probe+0x208/0x368 [snd_soc_x1e80100]  platform_probe+0xc0/0x188  really_probe+0x188/0x804  __driver_probe_device+0x158/0x358  driver_probe_device+0x60/0x190  __device_attach_driver+0x16c/0x2a8  bus_for_each_drv+0x100/0x194  __device_attach+0x174/0x380  device_initial_probe+0x14/0x20  bus_probe_device+0x124/0x154  deferred_probe_work_func+0x140/0x220  process_one_work+0x500/0xb70  worker_thread+0x630/0xfb0  kthread+0x370/0x6c0  ret_from_fork+0x10/0x20  Freed by task 3426:  kasan_save_stack+0x40/0x68  kasan_save_track+0x20/0x40  __kasan_save_free_info+0x4c/0x80  __kasan_slab_free+0x78/0xa0  kfree+0x100/0x4a4  devres_release_all+0x144/0x210  device_unbind_cleanup+0x20/0x190  device_release_driver_internal+0x350/0x468  device_release_driver+0x18/0x30  bus_remove_device+0x1a0/0x35c  device_del+0x314/0x7f0  device_unregister+0x20/0xbc  apr_remove_device+0x5c/0x7c [apr]  device_for_each_child+0xd8/0x160  apr_pd_status+0x7c/0xa8 [apr]  pdr_notifier_work+0x114/0x240 [pdr_interface]  process_one_work+0x500/0xb70  worker_thread+0x630/0xfb0  kthread+0x370/0x6c0  ret_from_fork+0x10/0x20",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31587.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31587.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31587",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.018",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02396",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0241",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0245",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0462",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31587"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31587",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31587"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2461505",
                    "reference_id": "2461505",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2461505"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994366?format=api",
                    "purl": "pkg:deb/debian/linux@6.1.4-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.1.4-1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994368?format=api",
                    "purl": "pkg:deb/debian/linux@6.1.162-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.1.162-1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994375?format=api",
                    "purl": "pkg:deb/debian/linux@6.12.74-2~bpo12%2B1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.12.74-2~bpo12%252B1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1089478?format=api",
                    "purl": "pkg:deb/debian/linux@6.19.14-1~bpo13%2B1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.14-1~bpo13%252B1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1077786?format=api",
                    "purl": "pkg:deb/debian/linux@6.19.14-1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1apd-wwuv-cbem"
                        },
                        {
                            "vulnerability": "VCID-23s6-fs1s-4kfb"
                        },
                        {
                            "vulnerability": "VCID-359m-ajks-23ef"
                        },
                        {
                            "vulnerability": "VCID-3apf-j1g4-vfbr"
                        },
                        {
                            "vulnerability": "VCID-43df-n4rn-nua1"
                        },
                        {
                            "vulnerability": "VCID-49sp-s742-dbe6"
                        },
                        {
                            "vulnerability": "VCID-4a7s-trcw-nube"
                        },
                        {
                            "vulnerability": "VCID-5t5f-4e1q-23bd"
                        },
                        {
                            "vulnerability": "VCID-7m8f-1q1y-6uap"
                        },
                        {
                            "vulnerability": "VCID-9x33-33np-c7bv"
                        },
                        {
                            "vulnerability": "VCID-9zzh-5tb2-m7aa"
                        },
                        {
                            "vulnerability": "VCID-aaq7-t35x-t7gc"
                        },
                        {
                            "vulnerability": "VCID-c5x4-1mbq-quch"
                        },
                        {
                            "vulnerability": "VCID-c7wz-4crx-3fgt"
                        },
                        {
                            "vulnerability": "VCID-dpjc-pacw-8bfq"
                        },
                        {
                            "vulnerability": "VCID-dq8r-defv-hbg6"
                        },
                        {
                            "vulnerability": "VCID-f832-cd1v-x3dc"
                        },
                        {
                            "vulnerability": "VCID-hv1g-619g-4yhx"
                        },
                        {
                            "vulnerability": "VCID-hxgq-6b1c-uff9"
                        },
                        {
                            "vulnerability": "VCID-n1gz-v4eb-vqec"
                        },
                        {
                            "vulnerability": "VCID-n537-dmm4-7kas"
                        },
                        {
                            "vulnerability": "VCID-n59e-jkf6-13bf"
                        },
                        {
                            "vulnerability": "VCID-naqw-tuak-xqgc"
                        },
                        {
                            "vulnerability": "VCID-p3vt-v7gj-gqbc"
                        },
                        {
                            "vulnerability": "VCID-rfwn-gj6g-ubbs"
                        },
                        {
                            "vulnerability": "VCID-rmmf-ey8e-eubr"
                        },
                        {
                            "vulnerability": "VCID-tm5u-v65w-8uep"
                        },
                        {
                            "vulnerability": "VCID-wnxx-8abs-5ucw"
                        },
                        {
                            "vulnerability": "VCID-x7bw-5cam-kubb"
                        },
                        {
                            "vulnerability": "VCID-xbam-fvfs-fydw"
                        },
                        {
                            "vulnerability": "VCID-xfew-wxwz-yka3"
                        },
                        {
                            "vulnerability": "VCID-y28b-ghum-ykek"
                        },
                        {
                            "vulnerability": "VCID-y5aq-zmbx-suft"
                        },
                        {
                            "vulnerability": "VCID-zasa-vpjy-nyhm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.14-1"
                }
            ],
            "aliases": [
                "CVE-2026-31587"
            ],
            "risk_score": 1.9,
            "exploitability": "0.5",
            "weighted_severity": "3.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-uvrh-s5dy-puc5"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/354600?format=api",
            "vulnerability_id": "VCID-uyug-vjrw-87h6",
            "summary": "",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31681.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31681.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31681",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02202",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02232",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04832",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0462",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06543",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31681"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31681",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31681"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "5.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2461753",
                    "reference_id": "2461753",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2461753"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994366?format=api",
                    "purl": "pkg:deb/debian/linux@6.1.4-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.1.4-1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994368?format=api",
                    "purl": "pkg:deb/debian/linux@6.1.162-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.1.162-1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994375?format=api",
                    "purl": "pkg:deb/debian/linux@6.12.74-2~bpo12%2B1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.12.74-2~bpo12%252B1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1089478?format=api",
                    "purl": "pkg:deb/debian/linux@6.19.14-1~bpo13%2B1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.14-1~bpo13%252B1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1077786?format=api",
                    "purl": "pkg:deb/debian/linux@6.19.14-1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1apd-wwuv-cbem"
                        },
                        {
                            "vulnerability": "VCID-23s6-fs1s-4kfb"
                        },
                        {
                            "vulnerability": "VCID-359m-ajks-23ef"
                        },
                        {
                            "vulnerability": "VCID-3apf-j1g4-vfbr"
                        },
                        {
                            "vulnerability": "VCID-43df-n4rn-nua1"
                        },
                        {
                            "vulnerability": "VCID-49sp-s742-dbe6"
                        },
                        {
                            "vulnerability": "VCID-4a7s-trcw-nube"
                        },
                        {
                            "vulnerability": "VCID-5t5f-4e1q-23bd"
                        },
                        {
                            "vulnerability": "VCID-7m8f-1q1y-6uap"
                        },
                        {
                            "vulnerability": "VCID-9x33-33np-c7bv"
                        },
                        {
                            "vulnerability": "VCID-9zzh-5tb2-m7aa"
                        },
                        {
                            "vulnerability": "VCID-aaq7-t35x-t7gc"
                        },
                        {
                            "vulnerability": "VCID-c5x4-1mbq-quch"
                        },
                        {
                            "vulnerability": "VCID-c7wz-4crx-3fgt"
                        },
                        {
                            "vulnerability": "VCID-dpjc-pacw-8bfq"
                        },
                        {
                            "vulnerability": "VCID-dq8r-defv-hbg6"
                        },
                        {
                            "vulnerability": "VCID-f832-cd1v-x3dc"
                        },
                        {
                            "vulnerability": "VCID-hv1g-619g-4yhx"
                        },
                        {
                            "vulnerability": "VCID-hxgq-6b1c-uff9"
                        },
                        {
                            "vulnerability": "VCID-n1gz-v4eb-vqec"
                        },
                        {
                            "vulnerability": "VCID-n537-dmm4-7kas"
                        },
                        {
                            "vulnerability": "VCID-n59e-jkf6-13bf"
                        },
                        {
                            "vulnerability": "VCID-naqw-tuak-xqgc"
                        },
                        {
                            "vulnerability": "VCID-p3vt-v7gj-gqbc"
                        },
                        {
                            "vulnerability": "VCID-rfwn-gj6g-ubbs"
                        },
                        {
                            "vulnerability": "VCID-rmmf-ey8e-eubr"
                        },
                        {
                            "vulnerability": "VCID-tm5u-v65w-8uep"
                        },
                        {
                            "vulnerability": "VCID-wnxx-8abs-5ucw"
                        },
                        {
                            "vulnerability": "VCID-x7bw-5cam-kubb"
                        },
                        {
                            "vulnerability": "VCID-xbam-fvfs-fydw"
                        },
                        {
                            "vulnerability": "VCID-xfew-wxwz-yka3"
                        },
                        {
                            "vulnerability": "VCID-y28b-ghum-ykek"
                        },
                        {
                            "vulnerability": "VCID-y5aq-zmbx-suft"
                        },
                        {
                            "vulnerability": "VCID-zasa-vpjy-nyhm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.14-1"
                }
            ],
            "aliases": [
                "CVE-2026-31681"
            ],
            "risk_score": 2.8,
            "exploitability": "0.5",
            "weighted_severity": "5.5",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-uyug-vjrw-87h6"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/354545?format=api",
            "vulnerability_id": "VCID-uzrt-axb3-qfcs",
            "summary": "In the Linux kernel, the following vulnerability has been resolved:  staging: rtl8723bs: initialize le_tmp64 in rtw_BIP_verify()  Initialize le_tmp64 to zero in rtw_BIP_verify() to prevent using uninitialized data.  Smatch warns that only 6 bytes are copied to this 8-byte (u64) variable, leaving the last two bytes uninitialized:  drivers/staging/rtl8723bs/core/rtw_security.c:1308 rtw_BIP_verify() warn: not copying enough bytes for '&le_tmp64' (8 vs 6 bytes)  Initializing the variable at the start of the function fixes this warning and ensures predictable behavior.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31626.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31626.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31626",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0462",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00023",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06316",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08161",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08295",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08361",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31626"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31626",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31626"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2461466",
                    "reference_id": "2461466",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2461466"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994366?format=api",
                    "purl": "pkg:deb/debian/linux@6.1.4-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.1.4-1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994368?format=api",
                    "purl": "pkg:deb/debian/linux@6.1.162-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.1.162-1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994375?format=api",
                    "purl": "pkg:deb/debian/linux@6.12.74-2~bpo12%2B1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.12.74-2~bpo12%252B1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1089478?format=api",
                    "purl": "pkg:deb/debian/linux@6.19.14-1~bpo13%2B1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.14-1~bpo13%252B1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1077786?format=api",
                    "purl": "pkg:deb/debian/linux@6.19.14-1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1apd-wwuv-cbem"
                        },
                        {
                            "vulnerability": "VCID-23s6-fs1s-4kfb"
                        },
                        {
                            "vulnerability": "VCID-359m-ajks-23ef"
                        },
                        {
                            "vulnerability": "VCID-3apf-j1g4-vfbr"
                        },
                        {
                            "vulnerability": "VCID-43df-n4rn-nua1"
                        },
                        {
                            "vulnerability": "VCID-49sp-s742-dbe6"
                        },
                        {
                            "vulnerability": "VCID-4a7s-trcw-nube"
                        },
                        {
                            "vulnerability": "VCID-5t5f-4e1q-23bd"
                        },
                        {
                            "vulnerability": "VCID-7m8f-1q1y-6uap"
                        },
                        {
                            "vulnerability": "VCID-9x33-33np-c7bv"
                        },
                        {
                            "vulnerability": "VCID-9zzh-5tb2-m7aa"
                        },
                        {
                            "vulnerability": "VCID-aaq7-t35x-t7gc"
                        },
                        {
                            "vulnerability": "VCID-c5x4-1mbq-quch"
                        },
                        {
                            "vulnerability": "VCID-c7wz-4crx-3fgt"
                        },
                        {
                            "vulnerability": "VCID-dpjc-pacw-8bfq"
                        },
                        {
                            "vulnerability": "VCID-dq8r-defv-hbg6"
                        },
                        {
                            "vulnerability": "VCID-f832-cd1v-x3dc"
                        },
                        {
                            "vulnerability": "VCID-hv1g-619g-4yhx"
                        },
                        {
                            "vulnerability": "VCID-hxgq-6b1c-uff9"
                        },
                        {
                            "vulnerability": "VCID-n1gz-v4eb-vqec"
                        },
                        {
                            "vulnerability": "VCID-n537-dmm4-7kas"
                        },
                        {
                            "vulnerability": "VCID-n59e-jkf6-13bf"
                        },
                        {
                            "vulnerability": "VCID-naqw-tuak-xqgc"
                        },
                        {
                            "vulnerability": "VCID-p3vt-v7gj-gqbc"
                        },
                        {
                            "vulnerability": "VCID-rfwn-gj6g-ubbs"
                        },
                        {
                            "vulnerability": "VCID-rmmf-ey8e-eubr"
                        },
                        {
                            "vulnerability": "VCID-tm5u-v65w-8uep"
                        },
                        {
                            "vulnerability": "VCID-wnxx-8abs-5ucw"
                        },
                        {
                            "vulnerability": "VCID-x7bw-5cam-kubb"
                        },
                        {
                            "vulnerability": "VCID-xbam-fvfs-fydw"
                        },
                        {
                            "vulnerability": "VCID-xfew-wxwz-yka3"
                        },
                        {
                            "vulnerability": "VCID-y28b-ghum-ykek"
                        },
                        {
                            "vulnerability": "VCID-y5aq-zmbx-suft"
                        },
                        {
                            "vulnerability": "VCID-zasa-vpjy-nyhm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.14-1"
                }
            ],
            "aliases": [
                "CVE-2026-31626"
            ],
            "risk_score": 1.8,
            "exploitability": "0.5",
            "weighted_severity": "3.5",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-uzrt-axb3-qfcs"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/354537?format=api",
            "vulnerability_id": "VCID-vx8c-nssy-ubaj",
            "summary": "In the Linux kernel, the following vulnerability has been resolved:  fbdev: tdfxfb: avoid divide-by-zero on FBIOPUT_VSCREENINFO  Much like commit 19f953e74356 (\"fbdev: fb_pm2fb: Avoid potential divide by zero error\"), we also need to prevent that same crash from happening in the udlfb driver as it uses pixclock directly when dividing, which will crash.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31618.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31618.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31618",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01728",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02278",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02282",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02318",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0462",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31618"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31618",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31618"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2461563",
                    "reference_id": "2461563",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2461563"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994366?format=api",
                    "purl": "pkg:deb/debian/linux@6.1.4-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.1.4-1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994368?format=api",
                    "purl": "pkg:deb/debian/linux@6.1.162-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.1.162-1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994375?format=api",
                    "purl": "pkg:deb/debian/linux@6.12.74-2~bpo12%2B1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.12.74-2~bpo12%252B1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1089478?format=api",
                    "purl": "pkg:deb/debian/linux@6.19.14-1~bpo13%2B1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.14-1~bpo13%252B1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1077786?format=api",
                    "purl": "pkg:deb/debian/linux@6.19.14-1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1apd-wwuv-cbem"
                        },
                        {
                            "vulnerability": "VCID-23s6-fs1s-4kfb"
                        },
                        {
                            "vulnerability": "VCID-359m-ajks-23ef"
                        },
                        {
                            "vulnerability": "VCID-3apf-j1g4-vfbr"
                        },
                        {
                            "vulnerability": "VCID-43df-n4rn-nua1"
                        },
                        {
                            "vulnerability": "VCID-49sp-s742-dbe6"
                        },
                        {
                            "vulnerability": "VCID-4a7s-trcw-nube"
                        },
                        {
                            "vulnerability": "VCID-5t5f-4e1q-23bd"
                        },
                        {
                            "vulnerability": "VCID-7m8f-1q1y-6uap"
                        },
                        {
                            "vulnerability": "VCID-9x33-33np-c7bv"
                        },
                        {
                            "vulnerability": "VCID-9zzh-5tb2-m7aa"
                        },
                        {
                            "vulnerability": "VCID-aaq7-t35x-t7gc"
                        },
                        {
                            "vulnerability": "VCID-c5x4-1mbq-quch"
                        },
                        {
                            "vulnerability": "VCID-c7wz-4crx-3fgt"
                        },
                        {
                            "vulnerability": "VCID-dpjc-pacw-8bfq"
                        },
                        {
                            "vulnerability": "VCID-dq8r-defv-hbg6"
                        },
                        {
                            "vulnerability": "VCID-f832-cd1v-x3dc"
                        },
                        {
                            "vulnerability": "VCID-hv1g-619g-4yhx"
                        },
                        {
                            "vulnerability": "VCID-hxgq-6b1c-uff9"
                        },
                        {
                            "vulnerability": "VCID-n1gz-v4eb-vqec"
                        },
                        {
                            "vulnerability": "VCID-n537-dmm4-7kas"
                        },
                        {
                            "vulnerability": "VCID-n59e-jkf6-13bf"
                        },
                        {
                            "vulnerability": "VCID-naqw-tuak-xqgc"
                        },
                        {
                            "vulnerability": "VCID-p3vt-v7gj-gqbc"
                        },
                        {
                            "vulnerability": "VCID-rfwn-gj6g-ubbs"
                        },
                        {
                            "vulnerability": "VCID-rmmf-ey8e-eubr"
                        },
                        {
                            "vulnerability": "VCID-tm5u-v65w-8uep"
                        },
                        {
                            "vulnerability": "VCID-wnxx-8abs-5ucw"
                        },
                        {
                            "vulnerability": "VCID-x7bw-5cam-kubb"
                        },
                        {
                            "vulnerability": "VCID-xbam-fvfs-fydw"
                        },
                        {
                            "vulnerability": "VCID-xfew-wxwz-yka3"
                        },
                        {
                            "vulnerability": "VCID-y28b-ghum-ykek"
                        },
                        {
                            "vulnerability": "VCID-y5aq-zmbx-suft"
                        },
                        {
                            "vulnerability": "VCID-zasa-vpjy-nyhm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.14-1"
                }
            ],
            "aliases": [
                "CVE-2026-31618"
            ],
            "risk_score": 1.4,
            "exploitability": "0.5",
            "weighted_severity": "2.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vx8c-nssy-ubaj"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/354495?format=api",
            "vulnerability_id": "VCID-vzyy-16xe-qkgm",
            "summary": "In the Linux kernel, the following vulnerability has been resolved:  media: hackrf: fix to not free memory after the device is registered in hackrf_probe()  In hackrf driver, the following race condition occurs: ``` \t\tCPU0\t\t\t\t\t\tCPU1 hackrf_probe()   kzalloc(); // alloc hackrf_dev   ....   v4l2_device_register();   .... \t\t\t\t\t\tfd = sys_open(\"/path/to/dev\"); // open hackrf fd \t\t\t\t\t\t....   v4l2_device_unregister();   ....   kfree(); // free hackrf_dev   .... \t\t\t\t\t\tsys_ioctl(fd, ...); \t\t\t\t\t\t  v4l2_ioctl(); \t\t\t\t\t\t    video_is_registered() // UAF!! \t\t\t\t\t\t.... \t\t\t\t\t\tsys_close(fd); \t\t\t\t\t\t  v4l2_release() // UAF!! \t\t\t\t\t\t    hackrf_video_release() \t\t\t\t\t\t      kfree(); // DFB!! ```  When a V4L2 or video device is unregistered, the device node is removed so new open() calls are blocked.  However, file descriptors that are already open-and any in-flight I/O-do not terminate immediately; they remain valid until the last reference is dropped and the driver's release() is invoked.  Therefore, freeing device memory on the error path after hackrf_probe() has registered dev it will lead to a race to use-after-free vuln, since those already-open handles haven't been released yet.  And since release() free memory too, race to use-after-free and double-free vuln occur.  To prevent this, if device is registered from probe(), it should be modified to free memory only through release() rather than calling kfree() directly.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31576.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31576.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31576",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.018",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02396",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0241",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0245",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0462",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31576"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31576",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31576"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2461445",
                    "reference_id": "2461445",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2461445"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994366?format=api",
                    "purl": "pkg:deb/debian/linux@6.1.4-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.1.4-1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994368?format=api",
                    "purl": "pkg:deb/debian/linux@6.1.162-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.1.162-1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994375?format=api",
                    "purl": "pkg:deb/debian/linux@6.12.74-2~bpo12%2B1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.12.74-2~bpo12%252B1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1089478?format=api",
                    "purl": "pkg:deb/debian/linux@6.19.14-1~bpo13%2B1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.14-1~bpo13%252B1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1077786?format=api",
                    "purl": "pkg:deb/debian/linux@6.19.14-1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1apd-wwuv-cbem"
                        },
                        {
                            "vulnerability": "VCID-23s6-fs1s-4kfb"
                        },
                        {
                            "vulnerability": "VCID-359m-ajks-23ef"
                        },
                        {
                            "vulnerability": "VCID-3apf-j1g4-vfbr"
                        },
                        {
                            "vulnerability": "VCID-43df-n4rn-nua1"
                        },
                        {
                            "vulnerability": "VCID-49sp-s742-dbe6"
                        },
                        {
                            "vulnerability": "VCID-4a7s-trcw-nube"
                        },
                        {
                            "vulnerability": "VCID-5t5f-4e1q-23bd"
                        },
                        {
                            "vulnerability": "VCID-7m8f-1q1y-6uap"
                        },
                        {
                            "vulnerability": "VCID-9x33-33np-c7bv"
                        },
                        {
                            "vulnerability": "VCID-9zzh-5tb2-m7aa"
                        },
                        {
                            "vulnerability": "VCID-aaq7-t35x-t7gc"
                        },
                        {
                            "vulnerability": "VCID-c5x4-1mbq-quch"
                        },
                        {
                            "vulnerability": "VCID-c7wz-4crx-3fgt"
                        },
                        {
                            "vulnerability": "VCID-dpjc-pacw-8bfq"
                        },
                        {
                            "vulnerability": "VCID-dq8r-defv-hbg6"
                        },
                        {
                            "vulnerability": "VCID-f832-cd1v-x3dc"
                        },
                        {
                            "vulnerability": "VCID-hv1g-619g-4yhx"
                        },
                        {
                            "vulnerability": "VCID-hxgq-6b1c-uff9"
                        },
                        {
                            "vulnerability": "VCID-n1gz-v4eb-vqec"
                        },
                        {
                            "vulnerability": "VCID-n537-dmm4-7kas"
                        },
                        {
                            "vulnerability": "VCID-n59e-jkf6-13bf"
                        },
                        {
                            "vulnerability": "VCID-naqw-tuak-xqgc"
                        },
                        {
                            "vulnerability": "VCID-p3vt-v7gj-gqbc"
                        },
                        {
                            "vulnerability": "VCID-rfwn-gj6g-ubbs"
                        },
                        {
                            "vulnerability": "VCID-rmmf-ey8e-eubr"
                        },
                        {
                            "vulnerability": "VCID-tm5u-v65w-8uep"
                        },
                        {
                            "vulnerability": "VCID-wnxx-8abs-5ucw"
                        },
                        {
                            "vulnerability": "VCID-x7bw-5cam-kubb"
                        },
                        {
                            "vulnerability": "VCID-xbam-fvfs-fydw"
                        },
                        {
                            "vulnerability": "VCID-xfew-wxwz-yka3"
                        },
                        {
                            "vulnerability": "VCID-y28b-ghum-ykek"
                        },
                        {
                            "vulnerability": "VCID-y5aq-zmbx-suft"
                        },
                        {
                            "vulnerability": "VCID-zasa-vpjy-nyhm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.14-1"
                }
            ],
            "aliases": [
                "CVE-2026-31576"
            ],
            "risk_score": 1.4,
            "exploitability": "0.5",
            "weighted_severity": "2.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vzyy-16xe-qkgm"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/354503?format=api",
            "vulnerability_id": "VCID-w8d1-9zry-wydv",
            "summary": "In the Linux kernel, the following vulnerability has been resolved:  media: mediatek: vcodec: fix use-after-free in encoder release path  The fops_vcodec_release() function frees the context structure (ctx) without first cancelling any pending or running work in ctx->encode_work. This creates a race window where the workqueue handler (mtk_venc_worker) may still be accessing the context memory after it has been freed.  Race condition:      CPU 0 (release path)               CPU 1 (workqueue)     ---------------------               ------------------     fops_vcodec_release()       v4l2_m2m_ctx_release()         v4l2_m2m_cancel_job()         // waits for m2m job \"done\"                                         mtk_venc_worker()                                           v4l2_m2m_job_finish()                                           // m2m job \"done\"                                           // BUT worker still running!                                           // post-job_finish access:                                         other ctx dereferences                                           // UAF if ctx already freed         // returns (job \"done\")       kfree(ctx)  // ctx freed  Root cause: The v4l2_m2m_ctx_release() only waits for the m2m job lifecycle (via TRANS_RUNNING flag), not the workqueue lifecycle. After v4l2_m2m_job_finish() is called, the m2m framework considers the job complete and v4l2_m2m_ctx_release() returns, but the worker function continues executing and may still access ctx.  The work is queued during encode operations via:   queue_work(ctx->dev->encode_workqueue, &ctx->encode_work) The worker function accesses ctx->m2m_ctx, ctx->dev, and other ctx fields even after calling v4l2_m2m_job_finish().  This vulnerability was confirmed with KASAN by running an instrumented test module that widens the post-job_finish race window. KASAN detected:    BUG: KASAN: slab-use-after-free in mtk_venc_worker+0x159/0x180   Read of size 4 at addr ffff88800326e000 by task kworker/u8:0/12    Workqueue: mtk_vcodec_enc_wq mtk_venc_worker    Allocated by task 47:     __kasan_kmalloc+0x7f/0x90     fops_vcodec_open+0x85/0x1a0    Freed by task 47:     __kasan_slab_free+0x43/0x70     kfree+0xee/0x3a0     fops_vcodec_release+0xb7/0x190  Fix this by calling cancel_work_sync(&ctx->encode_work) before kfree(ctx). This ensures the workqueue handler is both cancelled (if pending) and synchronized (waits for any running handler to complete) before the context is freed.  Placement rationale: The fix is placed after v4l2_ctrl_handler_free() and before list_del_init(&ctx->list). At this point, all m2m operations are done (v4l2_m2m_ctx_release() has returned), and we need to ensure the workqueue is synchronized before removing ctx from the list and freeing it.  Note: The open error path does NOT need cancel_work_sync() because INIT_WORK() only initializes the work structure - it does not schedule it. Work is only scheduled later during device_run() operations.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31584.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31584.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31584",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.018",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02396",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0241",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0245",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0462",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31584"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31584",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31584"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2461436",
                    "reference_id": "2461436",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2461436"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994366?format=api",
                    "purl": "pkg:deb/debian/linux@6.1.4-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.1.4-1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994368?format=api",
                    "purl": "pkg:deb/debian/linux@6.1.162-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.1.162-1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994375?format=api",
                    "purl": "pkg:deb/debian/linux@6.12.74-2~bpo12%2B1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.12.74-2~bpo12%252B1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1089478?format=api",
                    "purl": "pkg:deb/debian/linux@6.19.14-1~bpo13%2B1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.14-1~bpo13%252B1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1077786?format=api",
                    "purl": "pkg:deb/debian/linux@6.19.14-1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1apd-wwuv-cbem"
                        },
                        {
                            "vulnerability": "VCID-23s6-fs1s-4kfb"
                        },
                        {
                            "vulnerability": "VCID-359m-ajks-23ef"
                        },
                        {
                            "vulnerability": "VCID-3apf-j1g4-vfbr"
                        },
                        {
                            "vulnerability": "VCID-43df-n4rn-nua1"
                        },
                        {
                            "vulnerability": "VCID-49sp-s742-dbe6"
                        },
                        {
                            "vulnerability": "VCID-4a7s-trcw-nube"
                        },
                        {
                            "vulnerability": "VCID-5t5f-4e1q-23bd"
                        },
                        {
                            "vulnerability": "VCID-7m8f-1q1y-6uap"
                        },
                        {
                            "vulnerability": "VCID-9x33-33np-c7bv"
                        },
                        {
                            "vulnerability": "VCID-9zzh-5tb2-m7aa"
                        },
                        {
                            "vulnerability": "VCID-aaq7-t35x-t7gc"
                        },
                        {
                            "vulnerability": "VCID-c5x4-1mbq-quch"
                        },
                        {
                            "vulnerability": "VCID-c7wz-4crx-3fgt"
                        },
                        {
                            "vulnerability": "VCID-dpjc-pacw-8bfq"
                        },
                        {
                            "vulnerability": "VCID-dq8r-defv-hbg6"
                        },
                        {
                            "vulnerability": "VCID-f832-cd1v-x3dc"
                        },
                        {
                            "vulnerability": "VCID-hv1g-619g-4yhx"
                        },
                        {
                            "vulnerability": "VCID-hxgq-6b1c-uff9"
                        },
                        {
                            "vulnerability": "VCID-n1gz-v4eb-vqec"
                        },
                        {
                            "vulnerability": "VCID-n537-dmm4-7kas"
                        },
                        {
                            "vulnerability": "VCID-n59e-jkf6-13bf"
                        },
                        {
                            "vulnerability": "VCID-naqw-tuak-xqgc"
                        },
                        {
                            "vulnerability": "VCID-p3vt-v7gj-gqbc"
                        },
                        {
                            "vulnerability": "VCID-rfwn-gj6g-ubbs"
                        },
                        {
                            "vulnerability": "VCID-rmmf-ey8e-eubr"
                        },
                        {
                            "vulnerability": "VCID-tm5u-v65w-8uep"
                        },
                        {
                            "vulnerability": "VCID-wnxx-8abs-5ucw"
                        },
                        {
                            "vulnerability": "VCID-x7bw-5cam-kubb"
                        },
                        {
                            "vulnerability": "VCID-xbam-fvfs-fydw"
                        },
                        {
                            "vulnerability": "VCID-xfew-wxwz-yka3"
                        },
                        {
                            "vulnerability": "VCID-y28b-ghum-ykek"
                        },
                        {
                            "vulnerability": "VCID-y5aq-zmbx-suft"
                        },
                        {
                            "vulnerability": "VCID-zasa-vpjy-nyhm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.14-1"
                }
            ],
            "aliases": [
                "CVE-2026-31584"
            ],
            "risk_score": 1.9,
            "exploitability": "0.5",
            "weighted_severity": "3.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-w8d1-9zry-wydv"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/354538?format=api",
            "vulnerability_id": "VCID-wvu1-rfc1-zya9",
            "summary": "In the Linux kernel, the following vulnerability has been resolved:  ALSA: fireworks: bound device-supplied status before string array lookup  The status field in an EFW response is a 32-bit value supplied by the firewire device.  efr_status_names[] has 17 entries so a status value outside that range goes off into the weeds when looking at the %s value.  Even worse, the status could return EFR_STATUS_INCOMPLETE which is 0x80000000, and is obviously not in that array of potential strings.  Fix this up by properly bounding the index against the array size and printing \"unknown\" if it's not recognized.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31619.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "7.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31619.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31619",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01728",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02318",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02278",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02282",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0462",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31619"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31619",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31619"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H"
                        },
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2461495",
                    "reference_id": "2461495",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2461495"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994366?format=api",
                    "purl": "pkg:deb/debian/linux@6.1.4-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.1.4-1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994368?format=api",
                    "purl": "pkg:deb/debian/linux@6.1.162-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.1.162-1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994375?format=api",
                    "purl": "pkg:deb/debian/linux@6.12.74-2~bpo12%2B1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.12.74-2~bpo12%252B1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1089478?format=api",
                    "purl": "pkg:deb/debian/linux@6.19.14-1~bpo13%2B1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.14-1~bpo13%252B1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1077786?format=api",
                    "purl": "pkg:deb/debian/linux@6.19.14-1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1apd-wwuv-cbem"
                        },
                        {
                            "vulnerability": "VCID-23s6-fs1s-4kfb"
                        },
                        {
                            "vulnerability": "VCID-359m-ajks-23ef"
                        },
                        {
                            "vulnerability": "VCID-3apf-j1g4-vfbr"
                        },
                        {
                            "vulnerability": "VCID-43df-n4rn-nua1"
                        },
                        {
                            "vulnerability": "VCID-49sp-s742-dbe6"
                        },
                        {
                            "vulnerability": "VCID-4a7s-trcw-nube"
                        },
                        {
                            "vulnerability": "VCID-5t5f-4e1q-23bd"
                        },
                        {
                            "vulnerability": "VCID-7m8f-1q1y-6uap"
                        },
                        {
                            "vulnerability": "VCID-9x33-33np-c7bv"
                        },
                        {
                            "vulnerability": "VCID-9zzh-5tb2-m7aa"
                        },
                        {
                            "vulnerability": "VCID-aaq7-t35x-t7gc"
                        },
                        {
                            "vulnerability": "VCID-c5x4-1mbq-quch"
                        },
                        {
                            "vulnerability": "VCID-c7wz-4crx-3fgt"
                        },
                        {
                            "vulnerability": "VCID-dpjc-pacw-8bfq"
                        },
                        {
                            "vulnerability": "VCID-dq8r-defv-hbg6"
                        },
                        {
                            "vulnerability": "VCID-f832-cd1v-x3dc"
                        },
                        {
                            "vulnerability": "VCID-hv1g-619g-4yhx"
                        },
                        {
                            "vulnerability": "VCID-hxgq-6b1c-uff9"
                        },
                        {
                            "vulnerability": "VCID-n1gz-v4eb-vqec"
                        },
                        {
                            "vulnerability": "VCID-n537-dmm4-7kas"
                        },
                        {
                            "vulnerability": "VCID-n59e-jkf6-13bf"
                        },
                        {
                            "vulnerability": "VCID-naqw-tuak-xqgc"
                        },
                        {
                            "vulnerability": "VCID-p3vt-v7gj-gqbc"
                        },
                        {
                            "vulnerability": "VCID-rfwn-gj6g-ubbs"
                        },
                        {
                            "vulnerability": "VCID-rmmf-ey8e-eubr"
                        },
                        {
                            "vulnerability": "VCID-tm5u-v65w-8uep"
                        },
                        {
                            "vulnerability": "VCID-wnxx-8abs-5ucw"
                        },
                        {
                            "vulnerability": "VCID-x7bw-5cam-kubb"
                        },
                        {
                            "vulnerability": "VCID-xbam-fvfs-fydw"
                        },
                        {
                            "vulnerability": "VCID-xfew-wxwz-yka3"
                        },
                        {
                            "vulnerability": "VCID-y28b-ghum-ykek"
                        },
                        {
                            "vulnerability": "VCID-y5aq-zmbx-suft"
                        },
                        {
                            "vulnerability": "VCID-zasa-vpjy-nyhm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.14-1"
                }
            ],
            "aliases": [
                "CVE-2026-31619"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wvu1-rfc1-zya9"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/354509?format=api",
            "vulnerability_id": "VCID-x9wt-jmne-vudk",
            "summary": "In the Linux kernel, the following vulnerability has been resolved:  KVM: SEV: Drop WARN on large size for KVM_MEMORY_ENCRYPT_REG_REGION  Drop the WARN in sev_pin_memory() on npages overflowing an int, as the WARN is comically trivially to trigger from userspace, e.g. by doing:    struct kvm_enc_region range = {           .addr = 0,           .size = -1ul,   };    __vm_ioctl(vm, KVM_MEMORY_ENCRYPT_REG_REGION, &range);  Note, the checks in sev_mem_enc_register_region() that presumably exist to verify the incoming address+size are completely worthless, as both \"addr\" and \"size\" are u64s and SEV is 64-bit only, i.e. they _can't_ be greater than ULONG_MAX.  That wart will be cleaned up in the near future.  \tif (range->addr > ULONG_MAX || range->size > ULONG_MAX) \t\treturn -EINVAL;  Opportunistically add a comment to explain why the code calculates the number of pages the \"hard\" way, e.g. instead of just shifting @ulen.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31590.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31590.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31590",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01728",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02278",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02282",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02318",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0462",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31590"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31590",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31590"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2461540",
                    "reference_id": "2461540",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2461540"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994366?format=api",
                    "purl": "pkg:deb/debian/linux@6.1.4-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.1.4-1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994368?format=api",
                    "purl": "pkg:deb/debian/linux@6.1.162-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.1.162-1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994375?format=api",
                    "purl": "pkg:deb/debian/linux@6.12.74-2~bpo12%2B1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.12.74-2~bpo12%252B1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1089478?format=api",
                    "purl": "pkg:deb/debian/linux@6.19.14-1~bpo13%2B1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.14-1~bpo13%252B1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1077786?format=api",
                    "purl": "pkg:deb/debian/linux@6.19.14-1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1apd-wwuv-cbem"
                        },
                        {
                            "vulnerability": "VCID-23s6-fs1s-4kfb"
                        },
                        {
                            "vulnerability": "VCID-359m-ajks-23ef"
                        },
                        {
                            "vulnerability": "VCID-3apf-j1g4-vfbr"
                        },
                        {
                            "vulnerability": "VCID-43df-n4rn-nua1"
                        },
                        {
                            "vulnerability": "VCID-49sp-s742-dbe6"
                        },
                        {
                            "vulnerability": "VCID-4a7s-trcw-nube"
                        },
                        {
                            "vulnerability": "VCID-5t5f-4e1q-23bd"
                        },
                        {
                            "vulnerability": "VCID-7m8f-1q1y-6uap"
                        },
                        {
                            "vulnerability": "VCID-9x33-33np-c7bv"
                        },
                        {
                            "vulnerability": "VCID-9zzh-5tb2-m7aa"
                        },
                        {
                            "vulnerability": "VCID-aaq7-t35x-t7gc"
                        },
                        {
                            "vulnerability": "VCID-c5x4-1mbq-quch"
                        },
                        {
                            "vulnerability": "VCID-c7wz-4crx-3fgt"
                        },
                        {
                            "vulnerability": "VCID-dpjc-pacw-8bfq"
                        },
                        {
                            "vulnerability": "VCID-dq8r-defv-hbg6"
                        },
                        {
                            "vulnerability": "VCID-f832-cd1v-x3dc"
                        },
                        {
                            "vulnerability": "VCID-hv1g-619g-4yhx"
                        },
                        {
                            "vulnerability": "VCID-hxgq-6b1c-uff9"
                        },
                        {
                            "vulnerability": "VCID-n1gz-v4eb-vqec"
                        },
                        {
                            "vulnerability": "VCID-n537-dmm4-7kas"
                        },
                        {
                            "vulnerability": "VCID-n59e-jkf6-13bf"
                        },
                        {
                            "vulnerability": "VCID-naqw-tuak-xqgc"
                        },
                        {
                            "vulnerability": "VCID-p3vt-v7gj-gqbc"
                        },
                        {
                            "vulnerability": "VCID-rfwn-gj6g-ubbs"
                        },
                        {
                            "vulnerability": "VCID-rmmf-ey8e-eubr"
                        },
                        {
                            "vulnerability": "VCID-tm5u-v65w-8uep"
                        },
                        {
                            "vulnerability": "VCID-wnxx-8abs-5ucw"
                        },
                        {
                            "vulnerability": "VCID-x7bw-5cam-kubb"
                        },
                        {
                            "vulnerability": "VCID-xbam-fvfs-fydw"
                        },
                        {
                            "vulnerability": "VCID-xfew-wxwz-yka3"
                        },
                        {
                            "vulnerability": "VCID-y28b-ghum-ykek"
                        },
                        {
                            "vulnerability": "VCID-y5aq-zmbx-suft"
                        },
                        {
                            "vulnerability": "VCID-zasa-vpjy-nyhm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.14-1"
                }
            ],
            "aliases": [
                "CVE-2026-31590"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-x9wt-jmne-vudk"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/354541?format=api",
            "vulnerability_id": "VCID-y54q-e569-p7cx",
            "summary": "In the Linux kernel, the following vulnerability has been resolved:  NFC: digital: Bounds check NFC-A cascade depth in SDD response handler  The NFC-A anti-collision cascade in digital_in_recv_sdd_res() appends 3 or 4 bytes to target->nfcid1 on each round, but the number of cascade rounds is controlled entirely by the peer device.  The peer sets the cascade tag in the SDD_RES (deciding 3 vs 4 bytes) and the cascade-incomplete bit in the SEL_RES (deciding whether another round follows).  ISO 14443-3 limits NFC-A to three cascade levels and target->nfcid1 is sized accordingly (NFC_NFCID1_MAXSIZE = 10), but nothing in the driver actually enforces this.  This means a malicious peer can keep the cascade running, writing past the heap-allocated nfc_target with each round.  Fix this by rejecting the response when the accumulated UID would exceed the buffer.  Commit e329e71013c9 (\"NFC: nci: Bounds check struct nfc_target arrays\") fixed similar missing checks against the same field on the NCI path.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31622.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31622.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31622",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0462",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00023",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0646",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.0003",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08431",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.0003",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08577",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.0003",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08653",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31622"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31622",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31622"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2461459",
                    "reference_id": "2461459",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2461459"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994366?format=api",
                    "purl": "pkg:deb/debian/linux@6.1.4-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.1.4-1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994368?format=api",
                    "purl": "pkg:deb/debian/linux@6.1.162-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.1.162-1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994375?format=api",
                    "purl": "pkg:deb/debian/linux@6.12.74-2~bpo12%2B1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.12.74-2~bpo12%252B1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1089478?format=api",
                    "purl": "pkg:deb/debian/linux@6.19.14-1~bpo13%2B1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.14-1~bpo13%252B1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1077786?format=api",
                    "purl": "pkg:deb/debian/linux@6.19.14-1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1apd-wwuv-cbem"
                        },
                        {
                            "vulnerability": "VCID-23s6-fs1s-4kfb"
                        },
                        {
                            "vulnerability": "VCID-359m-ajks-23ef"
                        },
                        {
                            "vulnerability": "VCID-3apf-j1g4-vfbr"
                        },
                        {
                            "vulnerability": "VCID-43df-n4rn-nua1"
                        },
                        {
                            "vulnerability": "VCID-49sp-s742-dbe6"
                        },
                        {
                            "vulnerability": "VCID-4a7s-trcw-nube"
                        },
                        {
                            "vulnerability": "VCID-5t5f-4e1q-23bd"
                        },
                        {
                            "vulnerability": "VCID-7m8f-1q1y-6uap"
                        },
                        {
                            "vulnerability": "VCID-9x33-33np-c7bv"
                        },
                        {
                            "vulnerability": "VCID-9zzh-5tb2-m7aa"
                        },
                        {
                            "vulnerability": "VCID-aaq7-t35x-t7gc"
                        },
                        {
                            "vulnerability": "VCID-c5x4-1mbq-quch"
                        },
                        {
                            "vulnerability": "VCID-c7wz-4crx-3fgt"
                        },
                        {
                            "vulnerability": "VCID-dpjc-pacw-8bfq"
                        },
                        {
                            "vulnerability": "VCID-dq8r-defv-hbg6"
                        },
                        {
                            "vulnerability": "VCID-f832-cd1v-x3dc"
                        },
                        {
                            "vulnerability": "VCID-hv1g-619g-4yhx"
                        },
                        {
                            "vulnerability": "VCID-hxgq-6b1c-uff9"
                        },
                        {
                            "vulnerability": "VCID-n1gz-v4eb-vqec"
                        },
                        {
                            "vulnerability": "VCID-n537-dmm4-7kas"
                        },
                        {
                            "vulnerability": "VCID-n59e-jkf6-13bf"
                        },
                        {
                            "vulnerability": "VCID-naqw-tuak-xqgc"
                        },
                        {
                            "vulnerability": "VCID-p3vt-v7gj-gqbc"
                        },
                        {
                            "vulnerability": "VCID-rfwn-gj6g-ubbs"
                        },
                        {
                            "vulnerability": "VCID-rmmf-ey8e-eubr"
                        },
                        {
                            "vulnerability": "VCID-tm5u-v65w-8uep"
                        },
                        {
                            "vulnerability": "VCID-wnxx-8abs-5ucw"
                        },
                        {
                            "vulnerability": "VCID-x7bw-5cam-kubb"
                        },
                        {
                            "vulnerability": "VCID-xbam-fvfs-fydw"
                        },
                        {
                            "vulnerability": "VCID-xfew-wxwz-yka3"
                        },
                        {
                            "vulnerability": "VCID-y28b-ghum-ykek"
                        },
                        {
                            "vulnerability": "VCID-y5aq-zmbx-suft"
                        },
                        {
                            "vulnerability": "VCID-zasa-vpjy-nyhm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.14-1"
                }
            ],
            "aliases": [
                "CVE-2026-31622"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-y54q-e569-p7cx"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/354533?format=api",
            "vulnerability_id": "VCID-yahm-29wh-z3e9",
            "summary": "In the Linux kernel, the following vulnerability has been resolved:  smb: client: fix off-by-8 bounds check in check_wsl_eas()  The bounds check uses (u8 *)ea + nlen + 1 + vlen as the end of the EA name and value, but ea_data sits at offset sizeof(struct smb2_file_full_ea_info) = 8 from ea, not at offset 0.  The strncmp() later reads ea->ea_data[0..nlen-1] and the value bytes follow at ea_data[nlen+1..nlen+vlen], so the actual end is ea->ea_data + nlen + 1 + vlen.  Isn't pointer math fun?  The earlier check (u8 *)ea > end - sizeof(*ea) only guarantees the 8-byte header is in bounds, but since the last EA is placed within 8 bytes of the end of the response, the name and value bytes are read past the end of iov.  Fix this mess all up by using ea->ea_data as the base for the bounds check.  An \"untrusted\" server can use this to leak up to 8 bytes of kernel heap into the EA name comparison and influence which WSL xattr the data is interpreted as.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31614.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H"
                        },
                        {
                            "value": "7.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31614.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31614",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0241",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0245",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02396",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0462",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06767",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31614"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2461494",
                    "reference_id": "2461494",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2461494"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994375?format=api",
                    "purl": "pkg:deb/debian/linux@6.12.74-2~bpo12%2B1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.12.74-2~bpo12%252B1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1089478?format=api",
                    "purl": "pkg:deb/debian/linux@6.19.14-1~bpo13%2B1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.14-1~bpo13%252B1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1077786?format=api",
                    "purl": "pkg:deb/debian/linux@6.19.14-1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1apd-wwuv-cbem"
                        },
                        {
                            "vulnerability": "VCID-23s6-fs1s-4kfb"
                        },
                        {
                            "vulnerability": "VCID-359m-ajks-23ef"
                        },
                        {
                            "vulnerability": "VCID-3apf-j1g4-vfbr"
                        },
                        {
                            "vulnerability": "VCID-43df-n4rn-nua1"
                        },
                        {
                            "vulnerability": "VCID-49sp-s742-dbe6"
                        },
                        {
                            "vulnerability": "VCID-4a7s-trcw-nube"
                        },
                        {
                            "vulnerability": "VCID-5t5f-4e1q-23bd"
                        },
                        {
                            "vulnerability": "VCID-7m8f-1q1y-6uap"
                        },
                        {
                            "vulnerability": "VCID-9x33-33np-c7bv"
                        },
                        {
                            "vulnerability": "VCID-9zzh-5tb2-m7aa"
                        },
                        {
                            "vulnerability": "VCID-aaq7-t35x-t7gc"
                        },
                        {
                            "vulnerability": "VCID-c5x4-1mbq-quch"
                        },
                        {
                            "vulnerability": "VCID-c7wz-4crx-3fgt"
                        },
                        {
                            "vulnerability": "VCID-dpjc-pacw-8bfq"
                        },
                        {
                            "vulnerability": "VCID-dq8r-defv-hbg6"
                        },
                        {
                            "vulnerability": "VCID-f832-cd1v-x3dc"
                        },
                        {
                            "vulnerability": "VCID-hv1g-619g-4yhx"
                        },
                        {
                            "vulnerability": "VCID-hxgq-6b1c-uff9"
                        },
                        {
                            "vulnerability": "VCID-n1gz-v4eb-vqec"
                        },
                        {
                            "vulnerability": "VCID-n537-dmm4-7kas"
                        },
                        {
                            "vulnerability": "VCID-n59e-jkf6-13bf"
                        },
                        {
                            "vulnerability": "VCID-naqw-tuak-xqgc"
                        },
                        {
                            "vulnerability": "VCID-p3vt-v7gj-gqbc"
                        },
                        {
                            "vulnerability": "VCID-rfwn-gj6g-ubbs"
                        },
                        {
                            "vulnerability": "VCID-rmmf-ey8e-eubr"
                        },
                        {
                            "vulnerability": "VCID-tm5u-v65w-8uep"
                        },
                        {
                            "vulnerability": "VCID-wnxx-8abs-5ucw"
                        },
                        {
                            "vulnerability": "VCID-x7bw-5cam-kubb"
                        },
                        {
                            "vulnerability": "VCID-xbam-fvfs-fydw"
                        },
                        {
                            "vulnerability": "VCID-xfew-wxwz-yka3"
                        },
                        {
                            "vulnerability": "VCID-y28b-ghum-ykek"
                        },
                        {
                            "vulnerability": "VCID-y5aq-zmbx-suft"
                        },
                        {
                            "vulnerability": "VCID-zasa-vpjy-nyhm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.14-1"
                }
            ],
            "aliases": [
                "CVE-2026-31614"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-yahm-29wh-z3e9"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/354504?format=api",
            "vulnerability_id": "VCID-yj9c-fda5-57g2",
            "summary": "In the Linux kernel, the following vulnerability has been resolved:  media: vidtv: fix nfeeds state corruption on start_streaming failure  syzbot reported a memory leak in vidtv_psi_service_desc_init [1].  When vidtv_start_streaming() fails inside vidtv_start_feed(), the nfeeds counter is left incremented even though no feed was actually started. This corrupts the driver state: subsequent start_feed calls see nfeeds > 1 and skip starting the mux, while stop_feed calls eventually try to stop a non-existent stream.  This state corruption can also lead to memory leaks, since the mux and channel resources may be partially allocated during a failed start_streaming but never cleaned up, as the stop path finds dvb->streaming == false and returns early.  Fix by decrementing nfeeds back when start_streaming fails, keeping the counter in sync with the actual number of active feeds.  [1] BUG: memory leak unreferenced object 0xffff888145b50820 (size 32):  comm \"syz.0.17\", pid 6068, jiffies 4294944486  backtrace (crc 90a0c7d4):   vidtv_psi_service_desc_init+0x74/0x1b0 drivers/media/test-drivers/vidtv/vidtv_psi.c:288   vidtv_channel_s302m_init+0xb1/0x2a0 drivers/media/test-drivers/vidtv/vidtv_channel.c:83   vidtv_channels_init+0x1b/0x40 drivers/media/test-drivers/vidtv/vidtv_channel.c:524   vidtv_mux_init+0x516/0xbe0 drivers/media/test-drivers/vidtv/vidtv_mux.c:518   vidtv_start_streaming drivers/media/test-drivers/vidtv/vidtv_bridge.c:194 [inline]   vidtv_start_feed+0x33e/0x4d0 drivers/media/test-drivers/vidtv/vidtv_bridge.c:239",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31585.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31585.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31585",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01728",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02278",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02282",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02318",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0462",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31585"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31585",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31585"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2461578",
                    "reference_id": "2461578",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2461578"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994366?format=api",
                    "purl": "pkg:deb/debian/linux@6.1.4-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.1.4-1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994368?format=api",
                    "purl": "pkg:deb/debian/linux@6.1.162-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.1.162-1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994375?format=api",
                    "purl": "pkg:deb/debian/linux@6.12.74-2~bpo12%2B1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.12.74-2~bpo12%252B1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1089478?format=api",
                    "purl": "pkg:deb/debian/linux@6.19.14-1~bpo13%2B1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.14-1~bpo13%252B1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1077786?format=api",
                    "purl": "pkg:deb/debian/linux@6.19.14-1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1apd-wwuv-cbem"
                        },
                        {
                            "vulnerability": "VCID-23s6-fs1s-4kfb"
                        },
                        {
                            "vulnerability": "VCID-359m-ajks-23ef"
                        },
                        {
                            "vulnerability": "VCID-3apf-j1g4-vfbr"
                        },
                        {
                            "vulnerability": "VCID-43df-n4rn-nua1"
                        },
                        {
                            "vulnerability": "VCID-49sp-s742-dbe6"
                        },
                        {
                            "vulnerability": "VCID-4a7s-trcw-nube"
                        },
                        {
                            "vulnerability": "VCID-5t5f-4e1q-23bd"
                        },
                        {
                            "vulnerability": "VCID-7m8f-1q1y-6uap"
                        },
                        {
                            "vulnerability": "VCID-9x33-33np-c7bv"
                        },
                        {
                            "vulnerability": "VCID-9zzh-5tb2-m7aa"
                        },
                        {
                            "vulnerability": "VCID-aaq7-t35x-t7gc"
                        },
                        {
                            "vulnerability": "VCID-c5x4-1mbq-quch"
                        },
                        {
                            "vulnerability": "VCID-c7wz-4crx-3fgt"
                        },
                        {
                            "vulnerability": "VCID-dpjc-pacw-8bfq"
                        },
                        {
                            "vulnerability": "VCID-dq8r-defv-hbg6"
                        },
                        {
                            "vulnerability": "VCID-f832-cd1v-x3dc"
                        },
                        {
                            "vulnerability": "VCID-hv1g-619g-4yhx"
                        },
                        {
                            "vulnerability": "VCID-hxgq-6b1c-uff9"
                        },
                        {
                            "vulnerability": "VCID-n1gz-v4eb-vqec"
                        },
                        {
                            "vulnerability": "VCID-n537-dmm4-7kas"
                        },
                        {
                            "vulnerability": "VCID-n59e-jkf6-13bf"
                        },
                        {
                            "vulnerability": "VCID-naqw-tuak-xqgc"
                        },
                        {
                            "vulnerability": "VCID-p3vt-v7gj-gqbc"
                        },
                        {
                            "vulnerability": "VCID-rfwn-gj6g-ubbs"
                        },
                        {
                            "vulnerability": "VCID-rmmf-ey8e-eubr"
                        },
                        {
                            "vulnerability": "VCID-tm5u-v65w-8uep"
                        },
                        {
                            "vulnerability": "VCID-wnxx-8abs-5ucw"
                        },
                        {
                            "vulnerability": "VCID-x7bw-5cam-kubb"
                        },
                        {
                            "vulnerability": "VCID-xbam-fvfs-fydw"
                        },
                        {
                            "vulnerability": "VCID-xfew-wxwz-yka3"
                        },
                        {
                            "vulnerability": "VCID-y28b-ghum-ykek"
                        },
                        {
                            "vulnerability": "VCID-y5aq-zmbx-suft"
                        },
                        {
                            "vulnerability": "VCID-zasa-vpjy-nyhm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.14-1"
                }
            ],
            "aliases": [
                "CVE-2026-31585"
            ],
            "risk_score": 1.5,
            "exploitability": "0.5",
            "weighted_severity": "3.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-yj9c-fda5-57g2"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/354907?format=api",
            "vulnerability_id": "VCID-zgb6-kq8s-w3dm",
            "summary": "",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31686.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-31686.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31686",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0241",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0245",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06767",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09112",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-31686"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31686",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31686"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2463262",
                    "reference_id": "2463262",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2463262"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994366?format=api",
                    "purl": "pkg:deb/debian/linux@6.1.4-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.1.4-1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994368?format=api",
                    "purl": "pkg:deb/debian/linux@6.1.162-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.1.162-1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994375?format=api",
                    "purl": "pkg:deb/debian/linux@6.12.74-2~bpo12%2B1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.12.74-2~bpo12%252B1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1089478?format=api",
                    "purl": "pkg:deb/debian/linux@6.19.14-1~bpo13%2B1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.14-1~bpo13%252B1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1077786?format=api",
                    "purl": "pkg:deb/debian/linux@6.19.14-1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1apd-wwuv-cbem"
                        },
                        {
                            "vulnerability": "VCID-23s6-fs1s-4kfb"
                        },
                        {
                            "vulnerability": "VCID-359m-ajks-23ef"
                        },
                        {
                            "vulnerability": "VCID-3apf-j1g4-vfbr"
                        },
                        {
                            "vulnerability": "VCID-43df-n4rn-nua1"
                        },
                        {
                            "vulnerability": "VCID-49sp-s742-dbe6"
                        },
                        {
                            "vulnerability": "VCID-4a7s-trcw-nube"
                        },
                        {
                            "vulnerability": "VCID-5t5f-4e1q-23bd"
                        },
                        {
                            "vulnerability": "VCID-7m8f-1q1y-6uap"
                        },
                        {
                            "vulnerability": "VCID-9x33-33np-c7bv"
                        },
                        {
                            "vulnerability": "VCID-9zzh-5tb2-m7aa"
                        },
                        {
                            "vulnerability": "VCID-aaq7-t35x-t7gc"
                        },
                        {
                            "vulnerability": "VCID-c5x4-1mbq-quch"
                        },
                        {
                            "vulnerability": "VCID-c7wz-4crx-3fgt"
                        },
                        {
                            "vulnerability": "VCID-dpjc-pacw-8bfq"
                        },
                        {
                            "vulnerability": "VCID-dq8r-defv-hbg6"
                        },
                        {
                            "vulnerability": "VCID-f832-cd1v-x3dc"
                        },
                        {
                            "vulnerability": "VCID-hv1g-619g-4yhx"
                        },
                        {
                            "vulnerability": "VCID-hxgq-6b1c-uff9"
                        },
                        {
                            "vulnerability": "VCID-n1gz-v4eb-vqec"
                        },
                        {
                            "vulnerability": "VCID-n537-dmm4-7kas"
                        },
                        {
                            "vulnerability": "VCID-n59e-jkf6-13bf"
                        },
                        {
                            "vulnerability": "VCID-naqw-tuak-xqgc"
                        },
                        {
                            "vulnerability": "VCID-p3vt-v7gj-gqbc"
                        },
                        {
                            "vulnerability": "VCID-rfwn-gj6g-ubbs"
                        },
                        {
                            "vulnerability": "VCID-rmmf-ey8e-eubr"
                        },
                        {
                            "vulnerability": "VCID-tm5u-v65w-8uep"
                        },
                        {
                            "vulnerability": "VCID-wnxx-8abs-5ucw"
                        },
                        {
                            "vulnerability": "VCID-x7bw-5cam-kubb"
                        },
                        {
                            "vulnerability": "VCID-xbam-fvfs-fydw"
                        },
                        {
                            "vulnerability": "VCID-xfew-wxwz-yka3"
                        },
                        {
                            "vulnerability": "VCID-y28b-ghum-ykek"
                        },
                        {
                            "vulnerability": "VCID-y5aq-zmbx-suft"
                        },
                        {
                            "vulnerability": "VCID-zasa-vpjy-nyhm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.14-1"
                }
            ],
            "aliases": [
                "CVE-2026-31686"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "6.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zgb6-kq8s-w3dm"
        }
    ],
    "risk_score": "3.5",
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/linux@6.19.14-1"
}