{"url":"http://public2.vulnerablecode.io/api/packages/87007?format=json","purl":"pkg:rpm/redhat/kernel@5.14.0-570.103.1?arch=el9_6","type":"rpm","namespace":"redhat","name":"kernel","version":"5.14.0-570.103.1","qualifiers":{"arch":"el9_6"},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/65102?format=json","vulnerability_id":"VCID-6u26-3zuf-xqee","summary":"kernel: mlxsw: spectrum_mr: Fix use-after-free when updating multicast route stats","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-68800.json","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-68800.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-68800","reference_id":"","reference_type":"","scores":[{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16694","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16755","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16546","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16631","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16684","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16662","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16621","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16561","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16499","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16508","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16441","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16434","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16389","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-68800"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68800","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68800"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2429065","reference_id":"2429065","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2429065"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:10108","reference_id":"RHSA-2026:10108","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:10108"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:3083","reference_id":"RHSA-2026:3083","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:3083"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:3110","reference_id":"RHSA-2026:3110","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:3110"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:3275","reference_id":"RHSA-2026:3275","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:3275"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:3966","reference_id":"RHSA-2026:3966","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:3966"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:4759","reference_id":"RHSA-2026:4759","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:4759"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:6164","reference_id":"RHSA-2026:6164","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:6164"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:9512","reference_id":"RHSA-2026:9512","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:9512"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:9644","reference_id":"RHSA-2026:9644","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:9644"},{"reference_url":"https://usn.ubuntu.com/8096-1/","reference_id":"USN-8096-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8096-1/"},{"reference_url":"https://usn.ubuntu.com/8096-2/","reference_id":"USN-8096-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8096-2/"},{"reference_url":"https://usn.ubuntu.com/8096-3/","reference_id":"USN-8096-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8096-3/"},{"reference_url":"https://usn.ubuntu.com/8096-4/","reference_id":"USN-8096-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8096-4/"},{"reference_url":"https://usn.ubuntu.com/8096-5/","reference_id":"USN-8096-5","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8096-5/"},{"reference_url":"https://usn.ubuntu.com/8116-1/","reference_id":"USN-8116-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8116-1/"},{"reference_url":"https://usn.ubuntu.com/8141-1/","reference_id":"USN-8141-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8141-1/"},{"reference_url":"https://usn.ubuntu.com/8163-1/","reference_id":"USN-8163-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8163-1/"},{"reference_url":"https://usn.ubuntu.com/8163-2/","reference_id":"USN-8163-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8163-2/"},{"reference_url":"https://usn.ubuntu.com/8177-1/","reference_id":"USN-8177-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8177-1/"},{"reference_url":"https://usn.ubuntu.com/8177-2/","reference_id":"USN-8177-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8177-2/"},{"reference_url":"https://usn.ubuntu.com/8179-1/","reference_id":"USN-8179-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8179-1/"},{"reference_url":"https://usn.ubuntu.com/8179-2/","reference_id":"USN-8179-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8179-2/"},{"reference_url":"https://usn.ubuntu.com/8179-3/","reference_id":"USN-8179-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8179-3/"},{"reference_url":"https://usn.ubuntu.com/8183-1/","reference_id":"USN-8183-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8183-1/"},{"reference_url":"https://usn.ubuntu.com/8183-2/","reference_id":"USN-8183-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8183-2/"},{"reference_url":"https://usn.ubuntu.com/8184-1/","reference_id":"USN-8184-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8184-1/"},{"reference_url":"https://usn.ubuntu.com/8185-1/","reference_id":"USN-8185-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8185-1/"},{"reference_url":"https://usn.ubuntu.com/8185-2/","reference_id":"USN-8185-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8185-2/"},{"reference_url":"https://usn.ubuntu.com/8203-1/","reference_id":"USN-8203-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8203-1/"},{"reference_url":"https://usn.ubuntu.com/8204-1/","reference_id":"USN-8204-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8204-1/"}],"fixed_packages":[],"aliases":["CVE-2025-68800"],"risk_score":3.3,"exploitability":"0.5","weighted_severity":"6.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6u26-3zuf-xqee"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66632?format=json","vulnerability_id":"VCID-e2pp-vkfh-4qej","summary":"kernel: drm/sched: Fix potential double free in drm_sched_job_add_resv_dependencies","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-40096.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-40096.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-40096","reference_id":"","reference_type":"","scores":[{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12532","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12603","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12644","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12452","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17502","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17511","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17545","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17455","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17432","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17363","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17638","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17656","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.1761","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17557","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-40096"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40096","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40096"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2407333","reference_id":"2407333","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2407333"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0759","reference_id":"RHSA-2026:0759","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0759"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0760","reference_id":"RHSA-2026:0760","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0760"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1879","reference_id":"RHSA-2026:1879","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1879"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:2535","reference_id":"RHSA-2026:2535","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:2535"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:2560","reference_id":"RHSA-2026:2560","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:2560"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:2583","reference_id":"RHSA-2026:2583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:2583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:3275","reference_id":"RHSA-2026:3275","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:3275"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:6153","reference_id":"RHSA-2026:6153","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:6153"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:6164","reference_id":"RHSA-2026:6164","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:6164"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:6193","reference_id":"RHSA-2026:6193","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:6193"},{"reference_url":"https://usn.ubuntu.com/8029-1/","reference_id":"USN-8029-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8029-1/"},{"reference_url":"https://usn.ubuntu.com/8029-2/","reference_id":"USN-8029-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8029-2/"},{"reference_url":"https://usn.ubuntu.com/8029-3/","reference_id":"USN-8029-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8029-3/"},{"reference_url":"https://usn.ubuntu.com/8030-1/","reference_id":"USN-8030-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8030-1/"},{"reference_url":"https://usn.ubuntu.com/8048-1/","reference_id":"USN-8048-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8048-1/"},{"reference_url":"https://usn.ubuntu.com/8095-1/","reference_id":"USN-8095-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8095-1/"},{"reference_url":"https://usn.ubuntu.com/8095-2/","reference_id":"USN-8095-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8095-2/"},{"reference_url":"https://usn.ubuntu.com/8095-3/","reference_id":"USN-8095-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8095-3/"},{"reference_url":"https://usn.ubuntu.com/8095-4/","reference_id":"USN-8095-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8095-4/"},{"reference_url":"https://usn.ubuntu.com/8095-5/","reference_id":"USN-8095-5","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8095-5/"},{"reference_url":"https://usn.ubuntu.com/8100-1/","reference_id":"USN-8100-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8100-1/"},{"reference_url":"https://usn.ubuntu.com/8125-1/","reference_id":"USN-8125-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8125-1/"},{"reference_url":"https://usn.ubuntu.com/8126-1/","reference_id":"USN-8126-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8126-1/"},{"reference_url":"https://usn.ubuntu.com/8165-1/","reference_id":"USN-8165-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8165-1/"}],"fixed_packages":[],"aliases":["CVE-2025-40096"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-e2pp-vkfh-4qej"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/64563?format=json","vulnerability_id":"VCID-j4pn-ck3q-byb7","summary":"kernel: macvlan: fix error recovery in macvlan_common_newlink()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-23209.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-23209.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2026-23209","reference_id":"","reference_type":"","scores":[{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02369","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02338","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02348","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02344","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03197","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03225","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03176","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.0315","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.0316","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03281","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04596","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04533","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04554","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2026-23209"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23209","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23209"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2439900","reference_id":"2439900","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2439900"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:6036","reference_id":"RHSA-2026:6036","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:6036"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:6037","reference_id":"RHSA-2026:6037","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:6037"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:6153","reference_id":"RHSA-2026:6153","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:6153"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:6164","reference_id":"RHSA-2026:6164","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:6164"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:6310","reference_id":"RHSA-2026:6310","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:6310"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:6632","reference_id":"RHSA-2026:6632","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:6632"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:6692","reference_id":"RHSA-2026:6692","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:6692"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:6953","reference_id":"RHSA-2026:6953","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:6953"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:6954","reference_id":"RHSA-2026:6954","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:6954"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:6961","reference_id":"RHSA-2026:6961","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:6961"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:7003","reference_id":"RHSA-2026:7003","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:7003"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:7013","reference_id":"RHSA-2026:7013","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:7013"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:7100","reference_id":"RHSA-2026:7100","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:7100"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:9512","reference_id":"RHSA-2026:9512","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:9512"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:9644","reference_id":"RHSA-2026:9644","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:9644"},{"reference_url":"https://usn.ubuntu.com/8162-1/","reference_id":"USN-8162-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8162-1/"},{"reference_url":"https://usn.ubuntu.com/8177-1/","reference_id":"USN-8177-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8177-1/"},{"reference_url":"https://usn.ubuntu.com/8177-2/","reference_id":"USN-8177-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8177-2/"},{"reference_url":"https://usn.ubuntu.com/8179-1/","reference_id":"USN-8179-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8179-1/"},{"reference_url":"https://usn.ubuntu.com/8179-2/","reference_id":"USN-8179-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8179-2/"},{"reference_url":"https://usn.ubuntu.com/8179-3/","reference_id":"USN-8179-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8179-3/"},{"reference_url":"https://usn.ubuntu.com/8180-1/","reference_id":"USN-8180-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8180-1/"},{"reference_url":"https://usn.ubuntu.com/8180-2/","reference_id":"USN-8180-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8180-2/"},{"reference_url":"https://usn.ubuntu.com/8180-3/","reference_id":"USN-8180-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8180-3/"},{"reference_url":"https://usn.ubuntu.com/8180-4/","reference_id":"USN-8180-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8180-4/"},{"reference_url":"https://usn.ubuntu.com/8180-5/","reference_id":"USN-8180-5","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8180-5/"},{"reference_url":"https://usn.ubuntu.com/8183-1/","reference_id":"USN-8183-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8183-1/"},{"reference_url":"https://usn.ubuntu.com/8183-2/","reference_id":"USN-8183-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8183-2/"},{"reference_url":"https://usn.ubuntu.com/8184-1/","reference_id":"USN-8184-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8184-1/"},{"reference_url":"https://usn.ubuntu.com/8185-1/","reference_id":"USN-8185-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8185-1/"},{"reference_url":"https://usn.ubuntu.com/8185-2/","reference_id":"USN-8185-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8185-2/"},{"reference_url":"https://usn.ubuntu.com/8186-1/","reference_id":"USN-8186-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8186-1/"},{"reference_url":"https://usn.ubuntu.com/8187-1/","reference_id":"USN-8187-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8187-1/"},{"reference_url":"https://usn.ubuntu.com/8188-1/","reference_id":"USN-8188-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8188-1/"},{"reference_url":"https://usn.ubuntu.com/8203-1/","reference_id":"USN-8203-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8203-1/"},{"reference_url":"https://usn.ubuntu.com/8204-1/","reference_id":"USN-8204-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8204-1/"}],"fixed_packages":[],"aliases":["CVE-2026-23209"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-j4pn-ck3q-byb7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/72545?format=json","vulnerability_id":"VCID-q8t8-hf6h-7qh3","summary":"kernel: can: j1939: j1939_session_new(): fix skb reference counting","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-56645.json","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-56645.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-56645","reference_id":"","reference_type":"","scores":[{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.0067","published_at":"2026-04-02T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.00663","published_at":"2026-04-04T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.00666","published_at":"2026-04-07T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.00665","published_at":"2026-04-08T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.00657","published_at":"2026-04-11T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.0065","published_at":"2026-04-12T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.00652","published_at":"2026-04-13T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.00644","published_at":"2026-04-16T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.00648","published_at":"2026-04-18T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.0069","published_at":"2026-04-24T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.00692","published_at":"2026-04-26T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.00693","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-56645"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56645","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56645"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2334560","reference_id":"2334560","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2334560"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:20518","reference_id":"RHSA-2025:20518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:20518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:6164","reference_id":"RHSA-2026:6164","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:6164"},{"reference_url":"https://usn.ubuntu.com/7379-1/","reference_id":"USN-7379-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7379-1/"},{"reference_url":"https://usn.ubuntu.com/7379-2/","reference_id":"USN-7379-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7379-2/"},{"reference_url":"https://usn.ubuntu.com/7380-1/","reference_id":"USN-7380-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7380-1/"},{"reference_url":"https://usn.ubuntu.com/7381-1/","reference_id":"USN-7381-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7381-1/"},{"reference_url":"https://usn.ubuntu.com/7382-1/","reference_id":"USN-7382-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7382-1/"},{"reference_url":"https://usn.ubuntu.com/7387-1/","reference_id":"USN-7387-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7387-1/"},{"reference_url":"https://usn.ubuntu.com/7387-2/","reference_id":"USN-7387-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7387-2/"},{"reference_url":"https://usn.ubuntu.com/7387-3/","reference_id":"USN-7387-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7387-3/"},{"reference_url":"https://usn.ubuntu.com/7388-1/","reference_id":"USN-7388-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7388-1/"},{"reference_url":"https://usn.ubuntu.com/7389-1/","reference_id":"USN-7389-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7389-1/"},{"reference_url":"https://usn.ubuntu.com/7390-1/","reference_id":"USN-7390-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7390-1/"},{"reference_url":"https://usn.ubuntu.com/7391-1/","reference_id":"USN-7391-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7391-1/"},{"reference_url":"https://usn.ubuntu.com/7392-1/","reference_id":"USN-7392-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7392-1/"},{"reference_url":"https://usn.ubuntu.com/7392-2/","reference_id":"USN-7392-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7392-2/"},{"reference_url":"https://usn.ubuntu.com/7392-3/","reference_id":"USN-7392-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7392-3/"},{"reference_url":"https://usn.ubuntu.com/7392-4/","reference_id":"USN-7392-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7392-4/"},{"reference_url":"https://usn.ubuntu.com/7393-1/","reference_id":"USN-7393-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7393-1/"},{"reference_url":"https://usn.ubuntu.com/7401-1/","reference_id":"USN-7401-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7401-1/"},{"reference_url":"https://usn.ubuntu.com/7407-1/","reference_id":"USN-7407-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7407-1/"},{"reference_url":"https://usn.ubuntu.com/7413-1/","reference_id":"USN-7413-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7413-1/"},{"reference_url":"https://usn.ubuntu.com/7421-1/","reference_id":"USN-7421-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7421-1/"},{"reference_url":"https://usn.ubuntu.com/7449-1/","reference_id":"USN-7449-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7449-1/"},{"reference_url":"https://usn.ubuntu.com/7449-2/","reference_id":"USN-7449-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7449-2/"},{"reference_url":"https://usn.ubuntu.com/7450-1/","reference_id":"USN-7450-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7450-1/"},{"reference_url":"https://usn.ubuntu.com/7451-1/","reference_id":"USN-7451-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7451-1/"},{"reference_url":"https://usn.ubuntu.com/7452-1/","reference_id":"USN-7452-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7452-1/"},{"reference_url":"https://usn.ubuntu.com/7453-1/","reference_id":"USN-7453-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7453-1/"},{"reference_url":"https://usn.ubuntu.com/7458-1/","reference_id":"USN-7458-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7458-1/"},{"reference_url":"https://usn.ubuntu.com/7459-1/","reference_id":"USN-7459-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7459-1/"},{"reference_url":"https://usn.ubuntu.com/7459-2/","reference_id":"USN-7459-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7459-2/"},{"reference_url":"https://usn.ubuntu.com/7463-1/","reference_id":"USN-7463-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7463-1/"},{"reference_url":"https://usn.ubuntu.com/7468-1/","reference_id":"USN-7468-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7468-1/"},{"reference_url":"https://usn.ubuntu.com/7523-1/","reference_id":"USN-7523-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7523-1/"},{"reference_url":"https://usn.ubuntu.com/7524-1/","reference_id":"USN-7524-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7524-1/"},{"reference_url":"https://usn.ubuntu.com/7539-1/","reference_id":"USN-7539-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7539-1/"},{"reference_url":"https://usn.ubuntu.com/7540-1/","reference_id":"USN-7540-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7540-1/"}],"fixed_packages":[],"aliases":["CVE-2024-56645"],"risk_score":3.2,"exploitability":"0.5","weighted_severity":"6.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-q8t8-hf6h-7qh3"}],"fixing_vulnerabilities":[],"risk_score":"3.3","resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@5.14.0-570.103.1%3Farch=el9_6"}