{"url":"http://public2.vulnerablecode.io/api/packages/87127?format=json","purl":"pkg:rpm/redhat/kernel@4.18.0-193.187.1?arch=el8_2","type":"rpm","namespace":"redhat","name":"kernel","version":"4.18.0-193.187.1","qualifiers":{"arch":"el8_2"},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/64724?format=json","vulnerability_id":"VCID-64kf-nxzw-vubp","summary":"kernel: Linux kernel: Use-after-free in teql queueing discipline can lead to privilege escalation","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-23074.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-23074.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2026-23074","reference_id":"","reference_type":"","scores":[{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03383","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03404","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03362","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03333","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03352","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03379","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03364","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04719","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04757","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04801","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04808","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04809","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04505","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04476","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04485","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04622","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04665","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04699","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04723","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2026-23074"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23074","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23074"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2436791","reference_id":"2436791","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2436791"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:3083","reference_id":"RHSA-2026:3083","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:3083"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:3110","reference_id":"RHSA-2026:3110","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:3110"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:3268","reference_id":"RHSA-2026:3268","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:3268"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:3277","reference_id":"RHSA-2026:3277","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:3277"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:3360","reference_id":"RHSA-2026:3360","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:3360"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:3388","reference_id":"RHSA-2026:3388","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:3388"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:3634","reference_id":"RHSA-2026:3634","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:3634"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:3685","reference_id":"RHSA-2026:3685","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:3685"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:3810","reference_id":"RHSA-2026:3810","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:3810"},{"reference_url":"https://usn.ubuntu.com/8142-1/","reference_id":"USN-8142-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8142-1/"},{"reference_url":"https://usn.ubuntu.com/8143-1/","reference_id":"USN-8143-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8143-1/"},{"reference_url":"https://usn.ubuntu.com/8143-2/","reference_id":"USN-8143-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8143-2/"},{"reference_url":"https://usn.ubuntu.com/8145-1/","reference_id":"USN-8145-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8145-1/"},{"reference_url":"https://usn.ubuntu.com/8145-2/","reference_id":"USN-8145-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8145-2/"},{"reference_url":"https://usn.ubuntu.com/8145-3/","reference_id":"USN-8145-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8145-3/"},{"reference_url":"https://usn.ubuntu.com/8145-4/","reference_id":"USN-8145-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8145-4/"},{"reference_url":"https://usn.ubuntu.com/8145-5/","reference_id":"USN-8145-5","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8145-5/"},{"reference_url":"https://usn.ubuntu.com/8148-1/","reference_id":"USN-8148-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8148-1/"},{"reference_url":"https://usn.ubuntu.com/8148-2/","reference_id":"USN-8148-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8148-2/"},{"reference_url":"https://usn.ubuntu.com/8148-3/","reference_id":"USN-8148-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8148-3/"},{"reference_url":"https://usn.ubuntu.com/8148-4/","reference_id":"USN-8148-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8148-4/"},{"reference_url":"https://usn.ubuntu.com/8148-5/","reference_id":"USN-8148-5","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8148-5/"},{"reference_url":"https://usn.ubuntu.com/8148-6/","reference_id":"USN-8148-6","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8148-6/"},{"reference_url":"https://usn.ubuntu.com/8148-7/","reference_id":"USN-8148-7","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8148-7/"},{"reference_url":"https://usn.ubuntu.com/8149-1/","reference_id":"USN-8149-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8149-1/"},{"reference_url":"https://usn.ubuntu.com/8149-2/","reference_id":"USN-8149-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8149-2/"},{"reference_url":"https://usn.ubuntu.com/8149-3/","reference_id":"USN-8149-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8149-3/"},{"reference_url":"https://usn.ubuntu.com/8152-1/","reference_id":"USN-8152-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8152-1/"},{"reference_url":"https://usn.ubuntu.com/8159-1/","reference_id":"USN-8159-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8159-1/"},{"reference_url":"https://usn.ubuntu.com/8159-2/","reference_id":"USN-8159-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8159-2/"},{"reference_url":"https://usn.ubuntu.com/8159-3/","reference_id":"USN-8159-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8159-3/"},{"reference_url":"https://usn.ubuntu.com/8162-1/","reference_id":"USN-8162-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8162-1/"},{"reference_url":"https://usn.ubuntu.com/8163-1/","reference_id":"USN-8163-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8163-1/"},{"reference_url":"https://usn.ubuntu.com/8163-2/","reference_id":"USN-8163-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8163-2/"},{"reference_url":"https://usn.ubuntu.com/8164-1/","reference_id":"USN-8164-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8164-1/"},{"reference_url":"https://usn.ubuntu.com/8165-1/","reference_id":"USN-8165-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8165-1/"},{"reference_url":"https://usn.ubuntu.com/8188-1/","reference_id":"USN-8188-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8188-1/"},{"reference_url":"https://usn.ubuntu.com/8200-1/","reference_id":"USN-8200-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8200-1/"},{"reference_url":"https://usn.ubuntu.com/8200-2/","reference_id":"USN-8200-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8200-2/"},{"reference_url":"https://usn.ubuntu.com/8200-3/","reference_id":"USN-8200-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8200-3/"},{"reference_url":"https://usn.ubuntu.com/8201-1/","reference_id":"USN-8201-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8201-1/"},{"reference_url":"https://usn.ubuntu.com/8203-1/","reference_id":"USN-8203-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8203-1/"},{"reference_url":"https://usn.ubuntu.com/8224-1/","reference_id":"USN-8224-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8224-1/"},{"reference_url":"https://usn.ubuntu.com/8243-1/","reference_id":"USN-8243-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8243-1/"},{"reference_url":"https://usn.ubuntu.com/8261-1/","reference_id":"USN-8261-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8261-1/"},{"reference_url":"https://usn.ubuntu.com/8267-1/","reference_id":"USN-8267-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8267-1/"}],"fixed_packages":[],"aliases":["CVE-2026-23074"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-64kf-nxzw-vubp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/67360?format=json","vulnerability_id":"VCID-93ce-35w8-h7ef","summary":"kernel: nbd: fix incomplete validation of ioctl arg","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53513.json","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53513.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53513","reference_id":"","reference_type":"","scores":[{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02143","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02149","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02144","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02162","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02139","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02124","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.0212","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02096","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02108","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02196","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02166","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02157","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03121","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03136","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03098","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03172","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03167","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03158","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53513"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53513","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53513"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2400795","reference_id":"2400795","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2400795"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2394","reference_id":"RHSA-2024:2394","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2394"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22095","reference_id":"RHSA-2025:22095","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22095"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22124","reference_id":"RHSA-2025:22124","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22124"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22387","reference_id":"RHSA-2025:22387","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22387"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22388","reference_id":"RHSA-2025:22388","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22388"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23424","reference_id":"RHSA-2025:23424","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23424"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23426","reference_id":"RHSA-2025:23426","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23426"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0532","reference_id":"RHSA-2026:0532","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0532"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0533","reference_id":"RHSA-2026:0533","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0533"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0536","reference_id":"RHSA-2026:0536","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0536"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:3388","reference_id":"RHSA-2026:3388","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:3388"}],"fixed_packages":[],"aliases":["CVE-2023-53513"],"risk_score":3.3,"exploitability":"0.5","weighted_severity":"6.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-93ce-35w8-h7ef"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66200?format=json","vulnerability_id":"VCID-aw1b-z3v7-u3fj","summary":"kernel: Bluetooth: L2CAP: Fix use-after-free in l2cap_disconnect_{req,rsp}","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53827.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53827.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53827","reference_id":"","reference_type":"","scores":[{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08509","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08503","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08481","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00031","scoring_system":"epss","scoring_elements":"0.08811","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10876","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10929","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.108","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10911","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10975","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14491","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14384","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14454","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14487","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14484","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14429","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14308","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14588","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14383","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14549","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53827"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53827","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53827"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2420376","reference_id":"2420376","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2420376"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:3360","reference_id":"RHSA-2026:3360","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:3360"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:3388","reference_id":"RHSA-2026:3388","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:3388"}],"fixed_packages":[],"aliases":["CVE-2023-53827"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-aw1b-z3v7-u3fj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66155?format=json","vulnerability_id":"VCID-hvwv-k9qk-gfar","summary":"kernel: ip6_vti: fix slab-use-after-free in decode_session6","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53821.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53821.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53821","reference_id":"","reference_type":"","scores":[{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08509","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08503","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08481","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00031","scoring_system":"epss","scoring_elements":"0.08811","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10876","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10929","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.108","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10911","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10975","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14491","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14384","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14454","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14487","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14484","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14429","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14308","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14588","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14383","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14549","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53821"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53821","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53821"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2420329","reference_id":"2420329","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2420329"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2394","reference_id":"RHSA-2024:2394","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2394"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3138","reference_id":"RHSA-2024:3138","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3138"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:3267","reference_id":"RHSA-2026:3267","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:3267"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:3268","reference_id":"RHSA-2026:3268","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:3268"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:3277","reference_id":"RHSA-2026:3277","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:3277"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:3293","reference_id":"RHSA-2026:3293","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:3293"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:3358","reference_id":"RHSA-2026:3358","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:3358"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:3360","reference_id":"RHSA-2026:3360","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:3360"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:3375","reference_id":"RHSA-2026:3375","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:3375"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:3388","reference_id":"RHSA-2026:3388","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:3388"}],"fixed_packages":[],"aliases":["CVE-2023-53821"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hvwv-k9qk-gfar"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66303?format=json","vulnerability_id":"VCID-je4j-ksj2-hqb3","summary":"kernel: Linux kernel: Use-after-free in proc_readdir_de() can lead to privilege escalation or denial of service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-40271.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-40271.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-40271","reference_id":"","reference_type":"","scores":[{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16694","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16755","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21111","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21121","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21077","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21025","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21015","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20969","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.2105","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21026","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21004","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20877","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20879","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20847","published_at":"2026-04-29T12:55:00Z"},{"value":"0.04037","scoring_system":"epss","scoring_elements":"0.8858","published_at":"2026-05-12T12:55:00Z"},{"value":"0.04037","scoring_system":"epss","scoring_elements":"0.88539","published_at":"2026-05-05T12:55:00Z"},{"value":"0.04037","scoring_system":"epss","scoring_elements":"0.88555","published_at":"2026-05-07T12:55:00Z"},{"value":"0.04037","scoring_system":"epss","scoring_elements":"0.8857","published_at":"2026-05-09T12:55:00Z"},{"value":"0.04037","scoring_system":"epss","scoring_elements":"0.88568","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-40271"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40271","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40271"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2419837","reference_id":"2419837","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2419837"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/52550.c","reference_id":"CVE-2025-40271","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/52550.c"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1661","reference_id":"RHSA-2026:1661","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1661"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1662","reference_id":"RHSA-2026:1662","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1662"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1690","reference_id":"RHSA-2026:1690","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1690"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:2212","reference_id":"RHSA-2026:2212","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:2212"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:2759","reference_id":"RHSA-2026:2759","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:2759"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:2761","reference_id":"RHSA-2026:2761","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:2761"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:2766","reference_id":"RHSA-2026:2766","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:2766"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:3267","reference_id":"RHSA-2026:3267","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:3267"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:3268","reference_id":"RHSA-2026:3268","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:3268"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:3277","reference_id":"RHSA-2026:3277","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:3277"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:3293","reference_id":"RHSA-2026:3293","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:3293"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:3358","reference_id":"RHSA-2026:3358","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:3358"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:3360","reference_id":"RHSA-2026:3360","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:3360"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:3375","reference_id":"RHSA-2026:3375","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:3375"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:3388","reference_id":"RHSA-2026:3388","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:3388"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:3634","reference_id":"RHSA-2026:3634","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:3634"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:3685","reference_id":"RHSA-2026:3685","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:3685"},{"reference_url":"https://usn.ubuntu.com/8029-1/","reference_id":"USN-8029-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8029-1/"},{"reference_url":"https://usn.ubuntu.com/8029-2/","reference_id":"USN-8029-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8029-2/"},{"reference_url":"https://usn.ubuntu.com/8029-3/","reference_id":"USN-8029-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8029-3/"},{"reference_url":"https://usn.ubuntu.com/8030-1/","reference_id":"USN-8030-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8030-1/"},{"reference_url":"https://usn.ubuntu.com/8048-1/","reference_id":"USN-8048-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8048-1/"},{"reference_url":"https://usn.ubuntu.com/8095-1/","reference_id":"USN-8095-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8095-1/"},{"reference_url":"https://usn.ubuntu.com/8095-2/","reference_id":"USN-8095-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8095-2/"},{"reference_url":"https://usn.ubuntu.com/8095-3/","reference_id":"USN-8095-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8095-3/"},{"reference_url":"https://usn.ubuntu.com/8095-4/","reference_id":"USN-8095-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8095-4/"},{"reference_url":"https://usn.ubuntu.com/8095-5/","reference_id":"USN-8095-5","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8095-5/"},{"reference_url":"https://usn.ubuntu.com/8096-1/","reference_id":"USN-8096-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8096-1/"},{"reference_url":"https://usn.ubuntu.com/8096-2/","reference_id":"USN-8096-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8096-2/"},{"reference_url":"https://usn.ubuntu.com/8096-3/","reference_id":"USN-8096-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8096-3/"},{"reference_url":"https://usn.ubuntu.com/8096-4/","reference_id":"USN-8096-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8096-4/"},{"reference_url":"https://usn.ubuntu.com/8096-5/","reference_id":"USN-8096-5","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8096-5/"},{"reference_url":"https://usn.ubuntu.com/8100-1/","reference_id":"USN-8100-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8100-1/"},{"reference_url":"https://usn.ubuntu.com/8116-1/","reference_id":"USN-8116-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8116-1/"},{"reference_url":"https://usn.ubuntu.com/8125-1/","reference_id":"USN-8125-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8125-1/"},{"reference_url":"https://usn.ubuntu.com/8126-1/","reference_id":"USN-8126-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8126-1/"},{"reference_url":"https://usn.ubuntu.com/8141-1/","reference_id":"USN-8141-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8141-1/"},{"reference_url":"https://usn.ubuntu.com/8163-1/","reference_id":"USN-8163-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8163-1/"},{"reference_url":"https://usn.ubuntu.com/8163-2/","reference_id":"USN-8163-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8163-2/"},{"reference_url":"https://usn.ubuntu.com/8165-1/","reference_id":"USN-8165-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8165-1/"},{"reference_url":"https://usn.ubuntu.com/8243-1/","reference_id":"USN-8243-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8243-1/"},{"reference_url":"https://usn.ubuntu.com/8261-1/","reference_id":"USN-8261-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8261-1/"}],"fixed_packages":[],"aliases":["CVE-2025-40271"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"6.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-je4j-ksj2-hqb3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/68580?format=json","vulnerability_id":"VCID-mu97-p4wb-5qck","summary":"kernel: Linux kernel: Denial of Service in ATM CLIP module via infinite recursion","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-38459.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-38459.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-38459","reference_id":"","reference_type":"","scores":[{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03447","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03394","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03407","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03423","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03426","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.04991","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05083","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05066","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05048","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.04997","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.06114","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05846","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05878","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05914","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05924","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.0594","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.06031","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.06089","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.06112","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-38459"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38459","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38459"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2383487","reference_id":"2383487","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2383487"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1661","reference_id":"RHSA-2026:1661","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1661"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1662","reference_id":"RHSA-2026:1662","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1662"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:2212","reference_id":"RHSA-2026:2212","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:2212"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:3268","reference_id":"RHSA-2026:3268","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:3268"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:3277","reference_id":"RHSA-2026:3277","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:3277"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:3360","reference_id":"RHSA-2026:3360","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:3360"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:3388","reference_id":"RHSA-2026:3388","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:3388"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:3634","reference_id":"RHSA-2026:3634","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:3634"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:3685","reference_id":"RHSA-2026:3685","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:3685"},{"reference_url":"https://usn.ubuntu.com/7774-1/","reference_id":"USN-7774-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7774-1/"},{"reference_url":"https://usn.ubuntu.com/7774-2/","reference_id":"USN-7774-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7774-2/"},{"reference_url":"https://usn.ubuntu.com/7774-3/","reference_id":"USN-7774-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7774-3/"},{"reference_url":"https://usn.ubuntu.com/7774-4/","reference_id":"USN-7774-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7774-4/"},{"reference_url":"https://usn.ubuntu.com/7774-5/","reference_id":"USN-7774-5","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7774-5/"},{"reference_url":"https://usn.ubuntu.com/7775-1/","reference_id":"USN-7775-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7775-1/"},{"reference_url":"https://usn.ubuntu.com/7775-2/","reference_id":"USN-7775-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7775-2/"},{"reference_url":"https://usn.ubuntu.com/7775-3/","reference_id":"USN-7775-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7775-3/"},{"reference_url":"https://usn.ubuntu.com/7776-1/","reference_id":"USN-7776-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7776-1/"},{"reference_url":"https://usn.ubuntu.com/7879-1/","reference_id":"USN-7879-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7879-1/"},{"reference_url":"https://usn.ubuntu.com/7879-2/","reference_id":"USN-7879-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7879-2/"},{"reference_url":"https://usn.ubuntu.com/7879-3/","reference_id":"USN-7879-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7879-3/"},{"reference_url":"https://usn.ubuntu.com/7879-4/","reference_id":"USN-7879-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7879-4/"},{"reference_url":"https://usn.ubuntu.com/7880-1/","reference_id":"USN-7880-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7880-1/"},{"reference_url":"https://usn.ubuntu.com/7934-1/","reference_id":"USN-7934-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7934-1/"},{"reference_url":"https://usn.ubuntu.com/8028-1/","reference_id":"USN-8028-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8028-1/"},{"reference_url":"https://usn.ubuntu.com/8028-2/","reference_id":"USN-8028-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8028-2/"},{"reference_url":"https://usn.ubuntu.com/8028-3/","reference_id":"USN-8028-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8028-3/"},{"reference_url":"https://usn.ubuntu.com/8028-4/","reference_id":"USN-8028-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8028-4/"},{"reference_url":"https://usn.ubuntu.com/8028-5/","reference_id":"USN-8028-5","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8028-5/"},{"reference_url":"https://usn.ubuntu.com/8028-6/","reference_id":"USN-8028-6","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8028-6/"},{"reference_url":"https://usn.ubuntu.com/8028-7/","reference_id":"USN-8028-7","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8028-7/"},{"reference_url":"https://usn.ubuntu.com/8028-8/","reference_id":"USN-8028-8","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8028-8/"},{"reference_url":"https://usn.ubuntu.com/8031-1/","reference_id":"USN-8031-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8031-1/"},{"reference_url":"https://usn.ubuntu.com/8031-2/","reference_id":"USN-8031-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8031-2/"},{"reference_url":"https://usn.ubuntu.com/8031-3/","reference_id":"USN-8031-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8031-3/"},{"reference_url":"https://usn.ubuntu.com/8052-1/","reference_id":"USN-8052-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8052-1/"},{"reference_url":"https://usn.ubuntu.com/8052-2/","reference_id":"USN-8052-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8052-2/"},{"reference_url":"https://usn.ubuntu.com/8074-1/","reference_id":"USN-8074-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8074-1/"},{"reference_url":"https://usn.ubuntu.com/8074-2/","reference_id":"USN-8074-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8074-2/"},{"reference_url":"https://usn.ubuntu.com/8126-1/","reference_id":"USN-8126-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8126-1/"}],"fixed_packages":[],"aliases":["CVE-2025-38459"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mu97-p4wb-5qck"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/68023?format=json","vulnerability_id":"VCID-pvfh-earf-aqdj","summary":"kernel: Linux kernel: Denial of Service via out-of-bounds read in USB configuration parsing","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-39760.json","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-39760.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-39760","reference_id":"","reference_type":"","scores":[{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04201","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04222","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05379","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05348","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05336","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05325","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05273","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05274","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05424","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05464","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05506","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05508","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05509","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05554","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.0563","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05637","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.0564","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05323","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05356","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-39760"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39760","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39760"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2394601","reference_id":"2394601","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2394601"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1661","reference_id":"RHSA-2026:1661","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1661"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1662","reference_id":"RHSA-2026:1662","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1662"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:2212","reference_id":"RHSA-2026:2212","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:2212"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:2759","reference_id":"RHSA-2026:2759","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:2759"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:2766","reference_id":"RHSA-2026:2766","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:2766"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:3124","reference_id":"RHSA-2026:3124","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:3124"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:3267","reference_id":"RHSA-2026:3267","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:3267"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:3268","reference_id":"RHSA-2026:3268","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:3268"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:3277","reference_id":"RHSA-2026:3277","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:3277"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:3293","reference_id":"RHSA-2026:3293","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:3293"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:3358","reference_id":"RHSA-2026:3358","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:3358"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:3360","reference_id":"RHSA-2026:3360","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:3360"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:3375","reference_id":"RHSA-2026:3375","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:3375"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:3388","reference_id":"RHSA-2026:3388","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:3388"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:3634","reference_id":"RHSA-2026:3634","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:3634"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:3685","reference_id":"RHSA-2026:3685","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:3685"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:4012","reference_id":"RHSA-2026:4012","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:4012"},{"reference_url":"https://usn.ubuntu.com/7909-1/","reference_id":"USN-7909-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7909-1/"},{"reference_url":"https://usn.ubuntu.com/7909-2/","reference_id":"USN-7909-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7909-2/"},{"reference_url":"https://usn.ubuntu.com/7909-3/","reference_id":"USN-7909-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7909-3/"},{"reference_url":"https://usn.ubuntu.com/7909-4/","reference_id":"USN-7909-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7909-4/"},{"reference_url":"https://usn.ubuntu.com/7909-5/","reference_id":"USN-7909-5","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7909-5/"},{"reference_url":"https://usn.ubuntu.com/7910-1/","reference_id":"USN-7910-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7910-1/"},{"reference_url":"https://usn.ubuntu.com/7910-2/","reference_id":"USN-7910-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7910-2/"},{"reference_url":"https://usn.ubuntu.com/7933-1/","reference_id":"USN-7933-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7933-1/"},{"reference_url":"https://usn.ubuntu.com/7938-1/","reference_id":"USN-7938-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7938-1/"},{"reference_url":"https://usn.ubuntu.com/8028-1/","reference_id":"USN-8028-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8028-1/"},{"reference_url":"https://usn.ubuntu.com/8028-2/","reference_id":"USN-8028-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8028-2/"},{"reference_url":"https://usn.ubuntu.com/8028-3/","reference_id":"USN-8028-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8028-3/"},{"reference_url":"https://usn.ubuntu.com/8028-4/","reference_id":"USN-8028-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8028-4/"},{"reference_url":"https://usn.ubuntu.com/8028-5/","reference_id":"USN-8028-5","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8028-5/"},{"reference_url":"https://usn.ubuntu.com/8028-6/","reference_id":"USN-8028-6","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8028-6/"},{"reference_url":"https://usn.ubuntu.com/8028-7/","reference_id":"USN-8028-7","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8028-7/"},{"reference_url":"https://usn.ubuntu.com/8028-8/","reference_id":"USN-8028-8","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8028-8/"},{"reference_url":"https://usn.ubuntu.com/8031-1/","reference_id":"USN-8031-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8031-1/"},{"reference_url":"https://usn.ubuntu.com/8031-2/","reference_id":"USN-8031-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8031-2/"},{"reference_url":"https://usn.ubuntu.com/8031-3/","reference_id":"USN-8031-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8031-3/"},{"reference_url":"https://usn.ubuntu.com/8052-1/","reference_id":"USN-8052-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8052-1/"},{"reference_url":"https://usn.ubuntu.com/8052-2/","reference_id":"USN-8052-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8052-2/"},{"reference_url":"https://usn.ubuntu.com/8074-1/","reference_id":"USN-8074-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8074-1/"},{"reference_url":"https://usn.ubuntu.com/8074-2/","reference_id":"USN-8074-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8074-2/"},{"reference_url":"https://usn.ubuntu.com/8126-1/","reference_id":"USN-8126-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8126-1/"}],"fixed_packages":[],"aliases":["CVE-2025-39760"],"risk_score":3.2,"exploitability":"0.5","weighted_severity":"6.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pvfh-earf-aqdj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/68514?format=json","vulnerability_id":"VCID-qvnj-rkxf-ukas","summary":"kernel: Linux kernel: Memory corruption in Squashfs due to incorrect block size calculation","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-38415.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"7.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-38415.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-38415","reference_id":"","reference_type":"","scores":[{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.0705","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.07029","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.07084","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06997","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.07115","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00031","scoring_system":"epss","scoring_elements":"0.08872","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00031","scoring_system":"epss","scoring_elements":"0.09029","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00031","scoring_system":"epss","scoring_elements":"0.08994","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00031","scoring_system":"epss","scoring_elements":"0.08981","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00031","scoring_system":"epss","scoring_elements":"0.08848","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10371","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10259","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10239","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10226","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10171","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10115","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10263","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10332","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.1033","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-38415"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38415","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38415"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2383404","reference_id":"2383404","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2383404"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1661","reference_id":"RHSA-2026:1661","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1661"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1662","reference_id":"RHSA-2026:1662","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1662"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:2212","reference_id":"RHSA-2026:2212","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:2212"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:2282","reference_id":"RHSA-2026:2282","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:2282"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:2766","reference_id":"RHSA-2026:2766","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:2766"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:3088","reference_id":"RHSA-2026:3088","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:3088"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:3267","reference_id":"RHSA-2026:3267","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:3267"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:3268","reference_id":"RHSA-2026:3268","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:3268"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:3277","reference_id":"RHSA-2026:3277","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:3277"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:3293","reference_id":"RHSA-2026:3293","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:3293"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:3358","reference_id":"RHSA-2026:3358","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:3358"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:3360","reference_id":"RHSA-2026:3360","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:3360"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:3375","reference_id":"RHSA-2026:3375","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:3375"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:3388","reference_id":"RHSA-2026:3388","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:3388"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:3579","reference_id":"RHSA-2026:3579","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:3579"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:3634","reference_id":"RHSA-2026:3634","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:3634"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:3685","reference_id":"RHSA-2026:3685","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:3685"},{"reference_url":"https://usn.ubuntu.com/7769-1/","reference_id":"USN-7769-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7769-1/"},{"reference_url":"https://usn.ubuntu.com/7769-2/","reference_id":"USN-7769-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7769-2/"},{"reference_url":"https://usn.ubuntu.com/7769-3/","reference_id":"USN-7769-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7769-3/"},{"reference_url":"https://usn.ubuntu.com/7770-1/","reference_id":"USN-7770-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7770-1/"},{"reference_url":"https://usn.ubuntu.com/7771-1/","reference_id":"USN-7771-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7771-1/"},{"reference_url":"https://usn.ubuntu.com/7774-1/","reference_id":"USN-7774-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7774-1/"},{"reference_url":"https://usn.ubuntu.com/7774-2/","reference_id":"USN-7774-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7774-2/"},{"reference_url":"https://usn.ubuntu.com/7774-3/","reference_id":"USN-7774-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7774-3/"},{"reference_url":"https://usn.ubuntu.com/7774-4/","reference_id":"USN-7774-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7774-4/"},{"reference_url":"https://usn.ubuntu.com/7774-5/","reference_id":"USN-7774-5","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7774-5/"},{"reference_url":"https://usn.ubuntu.com/7775-1/","reference_id":"USN-7775-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7775-1/"},{"reference_url":"https://usn.ubuntu.com/7775-2/","reference_id":"USN-7775-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7775-2/"},{"reference_url":"https://usn.ubuntu.com/7775-3/","reference_id":"USN-7775-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7775-3/"},{"reference_url":"https://usn.ubuntu.com/7776-1/","reference_id":"USN-7776-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7776-1/"},{"reference_url":"https://usn.ubuntu.com/7789-1/","reference_id":"USN-7789-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7789-1/"},{"reference_url":"https://usn.ubuntu.com/7789-2/","reference_id":"USN-7789-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7789-2/"},{"reference_url":"https://usn.ubuntu.com/8028-1/","reference_id":"USN-8028-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8028-1/"},{"reference_url":"https://usn.ubuntu.com/8028-2/","reference_id":"USN-8028-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8028-2/"},{"reference_url":"https://usn.ubuntu.com/8028-3/","reference_id":"USN-8028-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8028-3/"},{"reference_url":"https://usn.ubuntu.com/8028-4/","reference_id":"USN-8028-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8028-4/"},{"reference_url":"https://usn.ubuntu.com/8028-5/","reference_id":"USN-8028-5","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8028-5/"},{"reference_url":"https://usn.ubuntu.com/8028-6/","reference_id":"USN-8028-6","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8028-6/"},{"reference_url":"https://usn.ubuntu.com/8028-7/","reference_id":"USN-8028-7","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8028-7/"},{"reference_url":"https://usn.ubuntu.com/8028-8/","reference_id":"USN-8028-8","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8028-8/"},{"reference_url":"https://usn.ubuntu.com/8031-1/","reference_id":"USN-8031-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8031-1/"},{"reference_url":"https://usn.ubuntu.com/8031-2/","reference_id":"USN-8031-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8031-2/"},{"reference_url":"https://usn.ubuntu.com/8031-3/","reference_id":"USN-8031-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8031-3/"},{"reference_url":"https://usn.ubuntu.com/8052-1/","reference_id":"USN-8052-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8052-1/"},{"reference_url":"https://usn.ubuntu.com/8052-2/","reference_id":"USN-8052-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8052-2/"},{"reference_url":"https://usn.ubuntu.com/8074-1/","reference_id":"USN-8074-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8074-1/"},{"reference_url":"https://usn.ubuntu.com/8074-2/","reference_id":"USN-8074-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8074-2/"},{"reference_url":"https://usn.ubuntu.com/8126-1/","reference_id":"USN-8126-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8126-1/"}],"fixed_packages":[],"aliases":["CVE-2025-38415"],"risk_score":3.2,"exploitability":"0.5","weighted_severity":"6.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qvnj-rkxf-ukas"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/65446?format=json","vulnerability_id":"VCID-vwpb-78dc-wuf7","summary":"kernel: tcp: fix a signed-integer-overflow bug in tcp_add_backlog()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50865.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50865.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50865","reference_id":"","reference_type":"","scores":[{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07494","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07533","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07514","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07573","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07593","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.0759","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07576","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07564","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07488","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07476","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07608","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07569","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07549","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07518","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10325","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10091","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10239","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10308","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10285","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50865"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50865","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50865"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426226","reference_id":"2426226","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426226"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1661","reference_id":"RHSA-2026:1661","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1661"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1662","reference_id":"RHSA-2026:1662","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1662"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1909","reference_id":"RHSA-2026:1909","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1909"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1946","reference_id":"RHSA-2026:1946","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1946"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:2490","reference_id":"RHSA-2026:2490","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:2490"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:2573","reference_id":"RHSA-2026:2573","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:2573"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:2577","reference_id":"RHSA-2026:2577","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:2577"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:3277","reference_id":"RHSA-2026:3277","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:3277"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:3360","reference_id":"RHSA-2026:3360","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:3360"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:3388","reference_id":"RHSA-2026:3388","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:3388"}],"fixed_packages":[],"aliases":["CVE-2022-50865"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vwpb-78dc-wuf7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69025?format=json","vulnerability_id":"VCID-x7ch-ec75-7faz","summary":"kernel: RDMA/core: Fix \"KASAN: slab-use-after-free Read in ib_register_device\" problem","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-38022.json","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-38022.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-38022","reference_id":"","reference_type":"","scores":[{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06382","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06387","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06372","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06307","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06354","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06394","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06636","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06696","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19568","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19663","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19665","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19491","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19578","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19538","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19569","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.1952","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19401","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.20427","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.20296","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-38022"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38022","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38022"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373326","reference_id":"2373326","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373326"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1661","reference_id":"RHSA-2026:1661","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1661"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1662","reference_id":"RHSA-2026:1662","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1662"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1690","reference_id":"RHSA-2026:1690","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1690"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:2212","reference_id":"RHSA-2026:2212","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:2212"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:2352","reference_id":"RHSA-2026:2352","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:2352"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:2535","reference_id":"RHSA-2026:2535","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:2535"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:2560","reference_id":"RHSA-2026:2560","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:2560"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:2583","reference_id":"RHSA-2026:2583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:2583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:2594","reference_id":"RHSA-2026:2594","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:2594"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:3268","reference_id":"RHSA-2026:3268","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:3268"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:3293","reference_id":"RHSA-2026:3293","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:3293"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:3360","reference_id":"RHSA-2026:3360","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:3360"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:3375","reference_id":"RHSA-2026:3375","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:3375"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:3388","reference_id":"RHSA-2026:3388","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:3388"},{"reference_url":"https://usn.ubuntu.com/7699-1/","reference_id":"USN-7699-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7699-1/"},{"reference_url":"https://usn.ubuntu.com/7699-2/","reference_id":"USN-7699-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7699-2/"},{"reference_url":"https://usn.ubuntu.com/7721-1/","reference_id":"USN-7721-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7721-1/"},{"reference_url":"https://usn.ubuntu.com/8096-1/","reference_id":"USN-8096-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8096-1/"},{"reference_url":"https://usn.ubuntu.com/8096-2/","reference_id":"USN-8096-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8096-2/"},{"reference_url":"https://usn.ubuntu.com/8096-3/","reference_id":"USN-8096-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8096-3/"},{"reference_url":"https://usn.ubuntu.com/8096-4/","reference_id":"USN-8096-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8096-4/"},{"reference_url":"https://usn.ubuntu.com/8096-5/","reference_id":"USN-8096-5","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8096-5/"},{"reference_url":"https://usn.ubuntu.com/8116-1/","reference_id":"USN-8116-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8116-1/"},{"reference_url":"https://usn.ubuntu.com/8141-1/","reference_id":"USN-8141-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8141-1/"},{"reference_url":"https://usn.ubuntu.com/8163-1/","reference_id":"USN-8163-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8163-1/"},{"reference_url":"https://usn.ubuntu.com/8163-2/","reference_id":"USN-8163-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8163-2/"},{"reference_url":"https://usn.ubuntu.com/8179-1/","reference_id":"USN-8179-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8179-1/"},{"reference_url":"https://usn.ubuntu.com/8179-2/","reference_id":"USN-8179-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8179-2/"},{"reference_url":"https://usn.ubuntu.com/8179-3/","reference_id":"USN-8179-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8179-3/"},{"reference_url":"https://usn.ubuntu.com/8179-4/","reference_id":"USN-8179-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8179-4/"},{"reference_url":"https://usn.ubuntu.com/8184-1/","reference_id":"USN-8184-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8184-1/"},{"reference_url":"https://usn.ubuntu.com/8185-1/","reference_id":"USN-8185-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8185-1/"},{"reference_url":"https://usn.ubuntu.com/8185-2/","reference_id":"USN-8185-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8185-2/"},{"reference_url":"https://usn.ubuntu.com/8203-1/","reference_id":"USN-8203-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8203-1/"},{"reference_url":"https://usn.ubuntu.com/8204-1/","reference_id":"USN-8204-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8204-1/"},{"reference_url":"https://usn.ubuntu.com/8243-1/","reference_id":"USN-8243-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8243-1/"},{"reference_url":"https://usn.ubuntu.com/8258-1/","reference_id":"USN-8258-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8258-1/"},{"reference_url":"https://usn.ubuntu.com/8260-1/","reference_id":"USN-8260-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8260-1/"},{"reference_url":"https://usn.ubuntu.com/8261-1/","reference_id":"USN-8261-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8261-1/"},{"reference_url":"https://usn.ubuntu.com/8265-1/","reference_id":"USN-8265-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8265-1/"}],"fixed_packages":[],"aliases":["CVE-2025-38022"],"risk_score":3.2,"exploitability":"0.5","weighted_severity":"6.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-x7ch-ec75-7faz"}],"fixing_vulnerabilities":[],"risk_score":"10.0","resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@4.18.0-193.187.1%3Farch=el8_2"}