{"url":"http://public2.vulnerablecode.io/api/packages/373876?format=json","purl":"pkg:alpm/archlinux/linux-zen@5.11.11.zen1-1","type":"alpm","namespace":"archlinux","name":"linux-zen","version":"5.11.11.zen1-1","qualifiers":{},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":"5.11.12.arch1-1","latest_non_vulnerable_version":"6.2-1","affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80466?format=json","vulnerability_id":"VCID-1png-mb1p-cbcw","summary":"kernel: use-after-free in nosy driver in nosy_ioctl() in drivers/firewire/nosy.c when a device is added twice","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3483.json","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3483.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-3483","reference_id":"","reference_type":"","scores":[{"value":"0.00167","scoring_system":"epss","scoring_elements":"0.37724","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00167","scoring_system":"epss","scoring_elements":"0.37438","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00167","scoring_system":"epss","scoring_elements":"0.37873","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00167","scoring_system":"epss","scoring_elements":"0.37854","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00167","scoring_system":"epss","scoring_elements":"0.37791","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00167","scoring_system":"epss","scoring_elements":"0.3755","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00167","scoring_system":"epss","scoring_elements":"0.37527","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00167","scoring_system":"epss","scoring_elements":"0.37905","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00167","scoring_system":"epss","scoring_elements":"0.37931","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00167","scoring_system":"epss","scoring_elements":"0.37809","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00167","scoring_system":"epss","scoring_elements":"0.37859","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00167","scoring_system":"epss","scoring_elements":"0.37872","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00167","scoring_system":"epss","scoring_elements":"0.37888","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00167","scoring_system":"epss","scoring_elements":"0.37852","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00167","scoring_system":"epss","scoring_elements":"0.37827","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-3483"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3483","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3483"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1948045","reference_id":"1948045","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1948045"},{"reference_url":"https://security.archlinux.org/AVG-1764","reference_id":"AVG-1764","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1764"},{"reference_url":"https://security.archlinux.org/AVG-1766","reference_id":"AVG-1766","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1766"},{"reference_url":"https://security.archlinux.org/AVG-1767","reference_id":"AVG-1767","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1767"},{"reference_url":"https://security.archlinux.org/AVG-1797","reference_id":"AVG-1797","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1797"},{"reference_url":"https://usn.ubuntu.com/4948-1/","reference_id":"USN-4948-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4948-1/"},{"reference_url":"https://usn.ubuntu.com/4979-1/","reference_id":"USN-4979-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4979-1/"},{"reference_url":"https://usn.ubuntu.com/4982-1/","reference_id":"USN-4982-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4982-1/"},{"reference_url":"https://usn.ubuntu.com/4984-1/","reference_id":"USN-4984-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4984-1/"},{"reference_url":"https://usn.ubuntu.com/5299-1/","reference_id":"USN-5299-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5299-1/"},{"reference_url":"https://usn.ubuntu.com/5343-1/","reference_id":"USN-5343-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5343-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/373877?format=json","purl":"pkg:alpm/archlinux/linux-zen@5.11.12.arch1-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux-zen@5.11.12.arch1-1"}],"aliases":["CVE-2021-3483"],"risk_score":3.3,"exploitability":"0.5","weighted_severity":"6.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1png-mb1p-cbcw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80470?format=json","vulnerability_id":"VCID-yz81-e5eu-1uft","summary":"kernel: KVM: double fetch in nested_svm_vmrun can lead to unrestricted MSR access","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-29657.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-29657.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-29657","reference_id":"","reference_type":"","scores":[{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13185","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13039","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13064","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13066","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13161","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13167","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13137","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13295","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13359","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13155","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13235","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13286","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13254","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13216","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13164","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-29657"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29657","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29657"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1995153","reference_id":"1995153","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1995153"},{"reference_url":"https://security.archlinux.org/AVG-1764","reference_id":"AVG-1764","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1764"},{"reference_url":"https://security.archlinux.org/AVG-1766","reference_id":"AVG-1766","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1766"},{"reference_url":"https://security.archlinux.org/AVG-1767","reference_id":"AVG-1767","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1767"},{"reference_url":"https://security.archlinux.org/AVG-1797","reference_id":"AVG-1797","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1797"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4356","reference_id":"RHSA-2021:4356","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4356"},{"reference_url":"https://usn.ubuntu.com/4948-1/","reference_id":"USN-4948-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4948-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/373877?format=json","purl":"pkg:alpm/archlinux/linux-zen@5.11.12.arch1-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux-zen@5.11.12.arch1-1"}],"aliases":["CVE-2021-29657"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-yz81-e5eu-1uft"}],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80499?format=json","vulnerability_id":"VCID-6zdt-kv9f-9qa9","summary":"kernel: memory leak in user mode driver due to lack of cleanup steps in kernel/usermode_driver.c and kernel/bpf/preload/bpf_preload_kern.c","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-29649.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-29649.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-29649","reference_id":"","reference_type":"","scores":[{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30572","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30176","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30583","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30549","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30371","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30256","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30708","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30755","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30569","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30628","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30662","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30666","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30621","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30576","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30601","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-29649"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29649","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29649"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1945379","reference_id":"1945379","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1945379"},{"reference_url":"https://security.archlinux.org/AVG-1747","reference_id":"AVG-1747","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1747"},{"reference_url":"https://security.archlinux.org/AVG-1748","reference_id":"AVG-1748","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1748"},{"reference_url":"https://security.archlinux.org/AVG-1749","reference_id":"AVG-1749","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1749"},{"reference_url":"https://security.archlinux.org/AVG-1750","reference_id":"AVG-1750","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1750"},{"reference_url":"https://usn.ubuntu.com/4948-1/","reference_id":"USN-4948-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4948-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/373876?format=json","purl":"pkg:alpm/archlinux/linux-zen@5.11.11.zen1-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1png-mb1p-cbcw"},{"vulnerability":"VCID-yz81-e5eu-1uft"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux-zen@5.11.11.zen1-1"}],"aliases":["CVE-2021-29649"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6zdt-kv9f-9qa9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80541?format=json","vulnerability_id":"VCID-hm3z-5v7u-pfay","summary":"kernel: DoS due to negative fragment size calculation in drivers/net/ethernet/freescale/gianfar.c","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-29264.json","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-29264.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-29264","reference_id":"","reference_type":"","scores":[{"value":"0.00103","scoring_system":"epss","scoring_elements":"0.28173","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00103","scoring_system":"epss","scoring_elements":"0.27774","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00103","scoring_system":"epss","scoring_elements":"0.28105","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00103","scoring_system":"epss","scoring_elements":"0.28088","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00103","scoring_system":"epss","scoring_elements":"0.28044","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00103","scoring_system":"epss","scoring_elements":"0.27962","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00103","scoring_system":"epss","scoring_elements":"0.2785","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00103","scoring_system":"epss","scoring_elements":"0.28244","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00103","scoring_system":"epss","scoring_elements":"0.28288","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00103","scoring_system":"epss","scoring_elements":"0.28079","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00103","scoring_system":"epss","scoring_elements":"0.28144","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00103","scoring_system":"epss","scoring_elements":"0.28187","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00103","scoring_system":"epss","scoring_elements":"0.28195","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00103","scoring_system":"epss","scoring_elements":"0.28151","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00103","scoring_system":"epss","scoring_elements":"0.28094","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-29264"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29264","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29264"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1944689","reference_id":"1944689","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1944689"},{"reference_url":"https://security.archlinux.org/AVG-1747","reference_id":"AVG-1747","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1747"},{"reference_url":"https://security.archlinux.org/AVG-1748","reference_id":"AVG-1748","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1748"},{"reference_url":"https://security.archlinux.org/AVG-1749","reference_id":"AVG-1749","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1749"},{"reference_url":"https://security.archlinux.org/AVG-1750","reference_id":"AVG-1750","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1750"},{"reference_url":"https://usn.ubuntu.com/4946-1/","reference_id":"USN-4946-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4946-1/"},{"reference_url":"https://usn.ubuntu.com/4948-1/","reference_id":"USN-4948-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4948-1/"},{"reference_url":"https://usn.ubuntu.com/4949-1/","reference_id":"USN-4949-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4949-1/"},{"reference_url":"https://usn.ubuntu.com/4982-1/","reference_id":"USN-4982-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4982-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/373876?format=json","purl":"pkg:alpm/archlinux/linux-zen@5.11.11.zen1-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1png-mb1p-cbcw"},{"vulnerability":"VCID-yz81-e5eu-1uft"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux-zen@5.11.11.zen1-1"}],"aliases":["CVE-2021-29264"],"risk_score":3.2,"exploitability":"0.5","weighted_severity":"6.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hm3z-5v7u-pfay"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80517?format=json","vulnerability_id":"VCID-hv6m-sb3t-ekcz","summary":"kernel: lack a full memory barrier upon the assignment of a new table value in net/netfilter/x_tables.c and include/linux/netfilter/x_tables.h may lead to DoS","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-29650.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-29650.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-29650","reference_id":"","reference_type":"","scores":[{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09072","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09101","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09008","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.08988","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09144","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09186","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09131","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09078","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.0913","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.0905","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09161","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09129","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09114","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-29650"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29650","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29650"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1945388","reference_id":"1945388","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1945388"},{"reference_url":"https://security.archlinux.org/AVG-1747","reference_id":"AVG-1747","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1747"},{"reference_url":"https://security.archlinux.org/AVG-1748","reference_id":"AVG-1748","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1748"},{"reference_url":"https://security.archlinux.org/AVG-1749","reference_id":"AVG-1749","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1749"},{"reference_url":"https://security.archlinux.org/AVG-1750","reference_id":"AVG-1750","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1750"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3327","reference_id":"RHSA-2021:3327","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3327"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3328","reference_id":"RHSA-2021:3328","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3328"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4140","reference_id":"RHSA-2021:4140","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4140"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4356","reference_id":"RHSA-2021:4356","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4356"},{"reference_url":"https://usn.ubuntu.com/4945-1/","reference_id":"USN-4945-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4945-1/"},{"reference_url":"https://usn.ubuntu.com/4945-2/","reference_id":"USN-4945-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4945-2/"},{"reference_url":"https://usn.ubuntu.com/4946-1/","reference_id":"USN-4946-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4946-1/"},{"reference_url":"https://usn.ubuntu.com/4947-1/","reference_id":"USN-4947-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4947-1/"},{"reference_url":"https://usn.ubuntu.com/4948-1/","reference_id":"USN-4948-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4948-1/"},{"reference_url":"https://usn.ubuntu.com/4949-1/","reference_id":"USN-4949-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4949-1/"},{"reference_url":"https://usn.ubuntu.com/5343-1/","reference_id":"USN-5343-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5343-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/373876?format=json","purl":"pkg:alpm/archlinux/linux-zen@5.11.11.zen1-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1png-mb1p-cbcw"},{"vulnerability":"VCID-yz81-e5eu-1uft"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux-zen@5.11.11.zen1-1"}],"aliases":["CVE-2021-29650"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hv6m-sb3t-ekcz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4266?format=json","vulnerability_id":"VCID-me91-v74k-myet","summary":"Linux: blkback driver may leak persistent grants","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-28688","reference_id":"","reference_type":"","scores":[{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32557","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32938","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32902","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32755","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.3264","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32912","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.33041","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.33074","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32904","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.3295","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.3298","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32983","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32945","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32919","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.3296","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-28688"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28688","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28688"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://security.archlinux.org/AVG-1747","reference_id":"AVG-1747","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1747"},{"reference_url":"https://security.archlinux.org/AVG-1748","reference_id":"AVG-1748","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1748"},{"reference_url":"https://security.archlinux.org/AVG-1749","reference_id":"AVG-1749","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1749"},{"reference_url":"https://security.archlinux.org/AVG-1750","reference_id":"AVG-1750","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1750"},{"reference_url":"https://usn.ubuntu.com/4946-1/","reference_id":"USN-4946-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4946-1/"},{"reference_url":"https://usn.ubuntu.com/4948-1/","reference_id":"USN-4948-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4948-1/"},{"reference_url":"https://usn.ubuntu.com/4982-1/","reference_id":"USN-4982-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4982-1/"},{"reference_url":"https://usn.ubuntu.com/4984-1/","reference_id":"USN-4984-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4984-1/"},{"reference_url":"https://usn.ubuntu.com/5343-1/","reference_id":"USN-5343-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5343-1/"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-371.html","reference_id":"XSA-371","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-371.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/373876?format=json","purl":"pkg:alpm/archlinux/linux-zen@5.11.11.zen1-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1png-mb1p-cbcw"},{"vulnerability":"VCID-yz81-e5eu-1uft"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux-zen@5.11.11.zen1-1"}],"aliases":["CVE-2021-28688"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-me91-v74k-myet"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80516?format=json","vulnerability_id":"VCID-r6xj-9g7c-k7gf","summary":"kernel: improper input validation in tipc_nl_retrieve_key function in net/tipc/node.c","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-29646.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-29646.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-29646","reference_id":"","reference_type":"","scores":[{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28599","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28193","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28548","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28499","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28383","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28272","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28683","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28732","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28538","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28603","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28643","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28645","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28601","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28552","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28572","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-29646"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29646","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29646"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1945345","reference_id":"1945345","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1945345"},{"reference_url":"https://security.archlinux.org/AVG-1747","reference_id":"AVG-1747","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1747"},{"reference_url":"https://security.archlinux.org/AVG-1748","reference_id":"AVG-1748","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1748"},{"reference_url":"https://security.archlinux.org/AVG-1749","reference_id":"AVG-1749","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1749"},{"reference_url":"https://security.archlinux.org/AVG-1750","reference_id":"AVG-1750","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1750"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4140","reference_id":"RHSA-2021:4140","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4140"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4356","reference_id":"RHSA-2021:4356","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4356"},{"reference_url":"https://usn.ubuntu.com/4947-1/","reference_id":"USN-4947-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4947-1/"},{"reference_url":"https://usn.ubuntu.com/4948-1/","reference_id":"USN-4948-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4948-1/"},{"reference_url":"https://usn.ubuntu.com/4949-1/","reference_id":"USN-4949-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4949-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/373876?format=json","purl":"pkg:alpm/archlinux/linux-zen@5.11.11.zen1-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1png-mb1p-cbcw"},{"vulnerability":"VCID-yz81-e5eu-1uft"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux-zen@5.11.11.zen1-1"}],"aliases":["CVE-2021-29646"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-r6xj-9g7c-k7gf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80519?format=json","vulnerability_id":"VCID-xm2m-3g4f-gfan","summary":"kernel: information disclosure due to uninitialized data structure in qrtr_recvmsg function in net/qrtr/qrtr.c","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-29647.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-29647.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-29647","reference_id":"","reference_type":"","scores":[{"value":"0.00094","scoring_system":"epss","scoring_elements":"0.26372","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00094","scoring_system":"epss","scoring_elements":"0.26078","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00094","scoring_system":"epss","scoring_elements":"0.26267","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00094","scoring_system":"epss","scoring_elements":"0.26242","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00094","scoring_system":"epss","scoring_elements":"0.26207","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00094","scoring_system":"epss","scoring_elements":"0.26132","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00094","scoring_system":"epss","scoring_elements":"0.26129","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00094","scoring_system":"epss","scoring_elements":"0.26423","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00094","scoring_system":"epss","scoring_elements":"0.26467","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00094","scoring_system":"epss","scoring_elements":"0.26241","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00094","scoring_system":"epss","scoring_elements":"0.26309","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00094","scoring_system":"epss","scoring_elements":"0.26357","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00094","scoring_system":"epss","scoring_elements":"0.26365","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00094","scoring_system":"epss","scoring_elements":"0.2632","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00094","scoring_system":"epss","scoring_elements":"0.26261","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-29647"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29647","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29647"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1945361","reference_id":"1945361","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1945361"},{"reference_url":"https://security.archlinux.org/AVG-1747","reference_id":"AVG-1747","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1747"},{"reference_url":"https://security.archlinux.org/AVG-1748","reference_id":"AVG-1748","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1748"},{"reference_url":"https://security.archlinux.org/AVG-1749","reference_id":"AVG-1749","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1749"},{"reference_url":"https://security.archlinux.org/AVG-1750","reference_id":"AVG-1750","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1750"},{"reference_url":"https://usn.ubuntu.com/4948-1/","reference_id":"USN-4948-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4948-1/"},{"reference_url":"https://usn.ubuntu.com/4979-1/","reference_id":"USN-4979-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4979-1/"},{"reference_url":"https://usn.ubuntu.com/4982-1/","reference_id":"USN-4982-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4982-1/"},{"reference_url":"https://usn.ubuntu.com/4984-1/","reference_id":"USN-4984-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4984-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/373876?format=json","purl":"pkg:alpm/archlinux/linux-zen@5.11.11.zen1-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1png-mb1p-cbcw"},{"vulnerability":"VCID-yz81-e5eu-1uft"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux-zen@5.11.11.zen1-1"}],"aliases":["CVE-2021-29647"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xm2m-3g4f-gfan"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80535?format=json","vulnerability_id":"VCID-zupm-5nps-ukbt","summary":"kernel: DoS due to BPF subsystem does not properly consider that resolved_ids and resolved_sizes are intentionally uninitialized in the vmlinux BPF","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-29648.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-29648.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-29648","reference_id":"","reference_type":"","scores":[{"value":"0.00109","scoring_system":"epss","scoring_elements":"0.29176","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00109","scoring_system":"epss","scoring_elements":"0.28778","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00109","scoring_system":"epss","scoring_elements":"0.29129","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00109","scoring_system":"epss","scoring_elements":"0.2908","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00109","scoring_system":"epss","scoring_elements":"0.2896","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00109","scoring_system":"epss","scoring_elements":"0.28849","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00109","scoring_system":"epss","scoring_elements":"0.29251","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00109","scoring_system":"epss","scoring_elements":"0.29302","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00109","scoring_system":"epss","scoring_elements":"0.29115","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00109","scoring_system":"epss","scoring_elements":"0.29179","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00109","scoring_system":"epss","scoring_elements":"0.29219","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00109","scoring_system":"epss","scoring_elements":"0.29224","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00109","scoring_system":"epss","scoring_elements":"0.29178","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00109","scoring_system":"epss","scoring_elements":"0.29126","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00109","scoring_system":"epss","scoring_elements":"0.29152","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-29648"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1945373","reference_id":"1945373","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1945373"},{"reference_url":"https://security.archlinux.org/AVG-1741","reference_id":"AVG-1741","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1741"},{"reference_url":"https://security.archlinux.org/AVG-1747","reference_id":"AVG-1747","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1747"},{"reference_url":"https://security.archlinux.org/AVG-1748","reference_id":"AVG-1748","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1748"},{"reference_url":"https://security.archlinux.org/AVG-1749","reference_id":"AVG-1749","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1749"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/373876?format=json","purl":"pkg:alpm/archlinux/linux-zen@5.11.11.zen1-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1png-mb1p-cbcw"},{"vulnerability":"VCID-yz81-e5eu-1uft"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux-zen@5.11.11.zen1-1"}],"aliases":["CVE-2021-29648"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zupm-5nps-ukbt"}],"risk_score":"3.5","resource_url":"http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux-zen@5.11.11.zen1-1"}